Target from: CVE Network

Basic, Non rootable

spring4shell / 0.0.0.0

1: Flag (system)
1: Service
110 pts

#headshot

Level 1 / Newcomer

tahaafarooq / 2069th Place

1: Flags found
1: Service discovered
110 pts
31 minutes

Try out the latest Spring4Shell vulnerability.

This is a target with direct implementation of the Spring RCE vulnerability CVE-2022-22965, accessible at http://10.0.200.14:8080/helloworld/greeting. The target is here to assist in familiarizing and developing exploits and mitigation tools for this vulnerability.

Description

As taken from LunaSec blog: Two RCEs exist and three vectors are being discussed online (one of which is not known to be remotely exploitable).

  • Confirmed: "Spring4Shell" in Spring Core that has been confirmed by several sources that leverages class injection (very severe),
  • Confirmed: CVE-2022-22963 in Spring Cloud Function (less severe),
  • Unconfirmed: A third weakness that was initially discussed as allowing RCE via Deserialization, but isn't exploitable (not severe currently).

References

Activity Stream

Latest activity on the platform

tahaafarooq managed to headshot [spring4shell] first, 34 months ago
tahaafarooq Exploited the spring4shell vuln for 100 points, 34 months ago
tahaafarooq Discovered a web service on Spring4Shell for 10 points, 34 months ago