关联漏洞
描述
An intentionally vulnerable (CVE-2017-8046) SrpingData REST appl with Swagger Support for pentesting purposes
介绍
# Vulnerable Spring DataRest App
This is an intentionally Spring Data REST Application to test and demostrate the CVE-2017-8046 vulnerability and the challenges of testing Command Injection and Remote Code Execution via REST apis
It has support for Swagger UI to use with tools where Swagger documention helps discovery and spidering, such as the OWASP Zend Attack Proxy (ZAP) plugin for Swagger
To use
- clone the repository locally
- build using maven
- run on
For more details on how this project was used in a pentesting exercise, see
文件快照
[4.0K] /data/pocs/952cc0afcd914e68f3b9c07672e703e067fbde42
├── [8.9K] mvnw
├── [5.7K] mvnw.cmd
├── [4.2K] pom.xml
├── [ 551] README.md
└── [4.0K] src
├── [4.0K] main
│ ├── [4.0K] java
│ │ ├── [4.0K] com
│ │ │ └── [4.0K] raythos
│ │ │ └── [4.0K] cyberia
│ │ │ └── [4.0K] spingdata
│ │ │ └── [4.0K] rest
│ │ │ ├── [1.1K] DirectoryRepository.java
│ │ │ ├── [ 684] EmployeeLocation.java
│ │ │ ├── [ 811] SpringfoxConfiguration.java
│ │ │ └── [ 812] VulnerableApplication.java
│ │ └── [4.0K] META-INF
│ │ └── [ 95] MANIFEST.MF
│ └── [4.0K] resources
│ ├── [ 363] application.properties
│ └── [ 203] data.sql
└── [4.0K] test
└── [4.0K] java
└── [4.0K] com
└── [4.0K] raythos
└── [4.0K] cyberia
└── [4.0K] vulnerablerest
└── [ 442] VulnerablerestApplicationTests.java
16 directories, 12 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。