Skip to content

denniskniep/Spring4Shell-vulnerable-app

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Spring4Shell sample vulnerable application

This is a dockerized application that is vulnerable to the Spring4Shell vulnerability (CVE-2022-22965). Full Java source for the war is provided and modifiable, the war will get re-built whenever the docker image is built. The built WAR will then be loaded by Tomcat. There is nothing special about this application, it's a simple hello world that's based off Spring tutorials.

Details: https://www.lunasec.io/docs/blog/spring-rce-vulnerabilities

Run

docker run -p 8080:8080 -p 8000:8000 --rm ghcr.io/denniskniep/vulnerable-app-spring4shell:latest

App should now be available at http://localhost:8080/helloworld/greeting WebPage

Build it yourself

  1. Clone the repository
  2. Build and run the container: docker build . -t spring4shell && docker run --rm -p 8080:8080 -p 8000:8000 spring4shell

Credits

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Packages

 
 
 

Languages

  • Java 74.4%
  • Dockerfile 19.5%
  • HTML 6.1%