Skip to content
This repository was archived by the owner on Jul 25, 2024. It is now read-only.

Commit 132f723

Browse files
committed
使用方式
1 parent 2fb1dbd commit 132f723

File tree

1 file changed

+81
-7
lines changed

1 file changed

+81
-7
lines changed

README.md

Lines changed: 81 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,88 @@
1-
# SpringBootExploit
1+
<h1 align="center" >SpringBootExploit</h1>
2+
<h3 align="center" >一款针对SpringBootEnv页面进行快速漏洞利用</h3>
3+
<p align="center">
4+
<a href="https://github.com/SummerSec/SpringBootExploit"></a>
5+
<a href="https://github.com/SummerSec/SpringBootExploit"><img alt="SpringBootExploit" src="https://img.shields.io/badge/Spring-Boot-Exploit-green"></a>
6+
<a href="https://github.com/SummerSec/SpringBootExploit"><img alt="Forks" src="https://img.shields.io/github/forks/SummerSec/SpringBootExploit"></a>
7+
<a href="https://github.com/SummerSec/SpringBootExploit"><img alt="Release" src="https://img.shields.io/github/release/SummerSec/SpringBootExploit.svg"></a>
8+
<a href="https://github.com/SummerSec/SpringBootExploit"><img alt="Stars" src="https://img.shields.io/github/stars/SummerSec/SpringBootExploit.svg?style=social&label=Stars"></a>
9+
<a href="https://github.com/SummerSec"><img alt="Follower" src="https://img.shields.io/github/followers/SummerSec.svg?style=social&label=Follow"></a>
10+
<a href="https://twitter.com/SecSummers"><img alt="SecSummers" src="https://img.shields.io/twitter/follow/SecSummers.svg"></a>
11+
<a xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://visitor-badge.laobi.icu"><rect fill="rgba(0,0,0,0)" height="20" width="49.6"/></a>
12+
<a xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://visitor-badge.laobi.icu"><rect fill="rgba(0,0,0,0)" height="20" width="17.0" x="49.6"/></a>
13+
</p>
214

3-
TODO
415

5-
* ldap和rmi随机绑定端口
6-
* Javafx的ui
7-
* 多线程
8-
*
916

1017

1118

12-
## 参考项目
19+
## 📝 TODO
20+
21+
* 支持Spring Boot Spel表达式注入
22+
* 支持Eureka XStream deserialization RCE
23+
* 支持Fastjson 内存马注入
24+
* 支持更多可以使用JNDI内存马注入反序列化漏洞
25+
* 支持内存马路径和密码修改
26+
27+
........
28+
29+
30+
31+
32+
----
33+
34+
## :dragon:来龙去脉
35+
36+
项目是根据[Spring Boot Vulnerability Exploit Check List](https://github.com/LandGrey/SpringBootVulExploit)清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。
37+
38+
39+
40+
----
41+
42+
43+
44+
## :zap: 下载安装
45+
46+
1.[releases](https://github.com/SummerSec/SpringBootExploit/releases)下载最新版Spring Boot Exploit压缩包,配合[JNDIExploit](https://github.com/SummerSec/JNDIExploit)使用。(:star:推荐)
47+
2.
48+
1. git clone https://github.com/SummerSec/SpringBootExploit
49+
2. git clone https://github.com/SummerSec/JNDIExploit
50+
3. mvn clean package -DskipTests 分别打SpringBootExploit包和JNDIExploit
51+
52+
53+
54+
----
55+
56+
## :clapper:使用方法
57+
58+
1. 首先在服务器上上传打包好的JNDIExploit工具,解压。使用命令启动java -jar JNDIExploit-1.2-SNAPSHOT.jar -i vps-ip -l 1389 -p 3456 (:star:1389 3456 端口不可变,否则会漏洞利用失败​)
59+
2. 输入目标地址和配置服务器地址,点击连接。出现如下图所示代表连接成功。
60+
61+
62+
63+
![image-20210812105637728](https://gitee.com/samny/images/raw/master/summersec//5u57er5ec/5u57er5ec.png)
64+
65+
3. 漏洞利用
66+
67+
建议首先点击检测环境,会自动判断是否存在漏洞。漏洞验证方法是Check list的方法,如果有更好的方法可以提交工单会考虑添加。
68+
69+
![image-20210812110100966](https://gitee.com/samny/images/raw/master/summersec//1u01er1ec/1u01er1ec.png)
70+
71+
4. 漏洞利用,目前只支持内存马注入
72+
73+
![image-20210812110245884](https://gitee.com/samny/images/raw/master/summersec//45u02er45ec/45u02er45ec.png)
74+
75+
![image-20210812110337585](https://gitee.com/samny/images/raw/master/summersec//37u03er37ec/37u03er37ec.png)
76+
77+
78+
79+
80+
81+
----
82+
83+
84+
85+
## :book: 参考项目
1386

1487
https://github.com/woodpecker-appstore/springboot-vuldb
88+

0 commit comments

Comments
 (0)