mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-28 01:04:30 +00:00
3.7 KiB
3.7 KiB
CVE-2018-1270
Description
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack.
POC
Reference
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://www.exploit-db.com/exploits/44796/
- https://www.exploit-db.com/exploits/44796/
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Github
- https://github.com/0day666/Vulnerability-verification
- https://github.com/0xT11/CVE-POC
- https://github.com/20142995/pocsuite
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CaledoniaProject/CVE-2018-1270
- https://github.com/CrackerCat/myhktools
- https://github.com/GhostTroops/myhktools
- https://github.com/Ljw1114/SpringFramework-Vul
- https://github.com/NetW0rK1le3r/awesome-hacking-lists
- https://github.com/NorthShad0w/FINAL
- https://github.com/OWASP/www-project-ide-vulscanner
- https://github.com/Secxt/FINAL
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/Tim1995/FINAL
- https://github.com/Venscor/CVE-2018-1270
- https://github.com/Whoopsunix/PPPRASP
- https://github.com/Whoopsunix/PPPVULNS
- https://github.com/XoneStar/docker-vuln-repo
- https://github.com/Zero094/Vulnerability-verification
- https://github.com/ax1sX/SpringSecurity
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/bkhablenko/CVE-2017-8046
- https://github.com/cybersecsi/docker-vuln-runner
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/do0dl3/myhktools
- https://github.com/genxor/CVE-2018-1270_EXP
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/myhktools
- https://github.com/ilmari666/cybsec
- https://github.com/iqrok/myhktools
- https://github.com/langu-xyz/JavaVulnMap
- https://github.com/lnick2023/nicenice
- https://github.com/nBp1Ng/FrameworkAndComponentVulnerabilities
- https://github.com/nBp1Ng/SpringFramework-Vul
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/readloud/Awesome-Stars
- https://github.com/src-kun/map
- https://github.com/superfish9/pt
- https://github.com/tafamace/CVE-2018-1270
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/tomoyamachi/gocarts
- https://github.com/touchmycrazyredhat/myhktools
- https://github.com/trhacknon/myhktools
- https://github.com/xbl2022/awesome-hacking-lists
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xinali/articles
- https://github.com/zisigui123123s/FINAL