POC详情: f0920b6836143f34359bd3217537f73df55b2bc9

来源
关联漏洞
标题: Pivotal Spring Data REST、Spring Boot和Spring Data 安全漏洞 (CVE-2017-8046)
描述:Pivotal Spring Data REST、Spring Boot和Spring Data都是美国Pivotal Software公司的产品。Pivotal Spring Data REST是一个建立在Spring Data存储库之上的用于分析应用程序的域模型并公开超媒体驱动的HTTP资源。Spring Boot是一个用来简化新Spring应用的初始搭建以及开发过程的全新框架。Spring Data是一个为数据访问提供基于Spring模型的项目。 Pivotal Spring Data REST、S
描述
This is a Java program that exploits Spring Break vulnerability (CVE-2017-8046).
介绍
# CVE-2017-8046 (Spring Break)

This is a Java program that exploits Spring Break vulnerability (CVE-2017-8046).

## Disclaimer

**This tool is intended for security engineers and appsec guys for security assessments. Please use this tool responsibly. I do not take responsibility for the way in which any one uses this application. I am NOT responsible for any damages caused or any crimes committed by using this tool.**

## Usage

```
$ ./mvnw clean install
$ java -jar target/spring-break.jar
```

## Links

* https://github.com/m3ssap0/spring-break_cve-2017-8046
* https://pivotal.io/security/cve-2017-8046
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8046
* https://nvd.nist.gov/vuln/detail/CVE-2017-8046
文件快照

[4.0K] /data/pocs/f0920b6836143f34359bd3217537f73df55b2bc9 ├── [1.1K] LICENSE ├── [6.4K] mvnw ├── [4.9K] mvnw.cmd ├── [1.6K] pom.xml ├── [ 724] README.md └── [4.0K] src └── [4.0K] main └── [4.0K] java └── [ 15K] SpringBreakCve20178046.java 3 directories, 6 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。