关联漏洞
介绍
# Spring CVE-2024-22262
## Proof of Concept
This repo contains a Development Container environment and Spring application of the correct version specifically to explore this CVE.
### Setup Instructions
Clone the repo to your machine and use Docker and your favorite IDE.
OR
Use GitPod online with `https://gitpod.io/#<URL to this repo>`
OR
Use GitPod Desktop:
1. [Download GitPod Desktop](https://www.gitpod.io/gitpod-desktop/download) and install it.
1. Click Projects.
1. Click New Environment.
1. Provide the URL of this repo.
Within the development environment you've chosen above:
1. Run the app:
<pre>
cd spring-cve-harness
mvn spring-boot:run
</pre>
2. Perform the exploit.
Don't forget to commit your changes back to this repo.
## Useful URLs
Development Containers Project Page
- https://containers.dev
Development Containers Images
- https://github.com/devcontainers/images
Developing inside a container
- https://code.visualstudio.com/docs/devcontainers/containers
Container Guides
- https://containers.dev/guides
文件快照
[4.0K] /data/pocs/a6fba0eddadef27511eb80ccbd070594dd3f27c2
├── [1.0K] README.md
└── [4.0K] spring-cve-harness
├── [1.9K] pom.xml
└── [4.0K] src
├── [4.0K] main
│ ├── [4.0K] java
│ │ └── [4.0K] com
│ │ └── [4.0K] example
│ │ └── [3.0K] App.java
│ └── [4.0K] resources
│ └── [4.0K] static
│ └── [ 11K] HeroDevsLogo.jpg
└── [4.0K] test
└── [4.0K] java
└── [4.0K] com
└── [4.0K] example
└── [ 259] AppTest.java
12 directories, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。