Target from: CVE Network

Basic, Non rootable

spring4shell / 0.0.0.0

1: Flag (system)
1: Service
110 pts

50%

Level 9 / Junior PenTester

BlueVoiD / 341st Place

0: Flags found
1: Service discovered
10 pts

Try out the latest Spring4Shell vulnerability.

This is a target with direct implementation of the Spring RCE vulnerability CVE-2022-22965, accessible at http://10.0.200.14:8080/helloworld/greeting. The target is here to assist in familiarizing and developing exploits and mitigation tools for this vulnerability.

Description

As taken from LunaSec blog: Two RCEs exist and three vectors are being discussed online (one of which is not known to be remotely exploitable).

  • Confirmed: "Spring4Shell" in Spring Core that has been confirmed by several sources that leverages class injection (very severe),
  • Confirmed: CVE-2022-22963 in Spring Cloud Function (less severe),
  • Unconfirmed: A third weakness that was initially discussed as allowing RCE via Deserialization, but isn't exploitable (not severe currently).

References

48 Headshots (newer first)

Niiamoo14, heyonyx, s1ngle, be444, n3thacker, XNOEX, Erasmus97, Crespo, drchunGa, NekoX7, cavca2012, akdangerous, Praise, Ckabos, canary, hackercon101, TroyLynx, c0nfirm, sp4t7y
xRuL0, michyamrane, SaintMArk, blomann, falconsec, luismtzsilva, ks4v3r, L0v3, jaxafed, noother, Theory, markuche, Twelve, Clientname, jinake, jblack81, PufferOverflow, L0n3lyW0lf, mmking, Muzec, sn1per, Pegasus, Grosik, 0rgis, D1ie3z, r0b0tG4nG, M4sk0ff, biba22, tahaafarooq

Activity Stream

Latest activity on the platform

BlueVoiD Discovered a web service on Spring4Shell for 10 points, 5 days ago