|
1 | | -# SpringBootExploit |
| 1 | +<h1 align="center" >SpringBootExploit</h1> |
| 2 | +<h3 align="center" >一款针对SpringBootEnv页面进行快速漏洞利用</h3> |
| 3 | + <p align="center"> |
| 4 | + <a href="https://github.com/SummerSec/SpringBootExploit"></a> |
| 5 | + <a href="https://github.com/SummerSec/SpringBootExploit"><img alt="SpringBootExploit" src="https://img.shields.io/badge/Spring-Boot-Exploit-green"></a> |
| 6 | + <a href="https://github.com/SummerSec/SpringBootExploit"><img alt="Forks" src="https://img.shields.io/github/forks/SummerSec/SpringBootExploit"></a> |
| 7 | + <a href="https://github.com/SummerSec/SpringBootExploit"><img alt="Release" src="https://img.shields.io/github/release/SummerSec/SpringBootExploit.svg"></a> |
| 8 | + <a href="https://github.com/SummerSec/SpringBootExploit"><img alt="Stars" src="https://img.shields.io/github/stars/SummerSec/SpringBootExploit.svg?style=social&label=Stars"></a> |
| 9 | + <a href="https://github.com/SummerSec"><img alt="Follower" src="https://img.shields.io/github/followers/SummerSec.svg?style=social&label=Follow"></a> |
| 10 | + <a href="https://twitter.com/SecSummers"><img alt="SecSummers" src="https://img.shields.io/twitter/follow/SecSummers.svg"></a> |
| 11 | + <a xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://visitor-badge.laobi.icu"><rect fill="rgba(0,0,0,0)" height="20" width="49.6"/></a> |
| 12 | + <a xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://visitor-badge.laobi.icu"><rect fill="rgba(0,0,0,0)" height="20" width="17.0" x="49.6"/></a> |
| 13 | + </p> |
2 | 14 |
|
3 | | -TODO |
4 | 15 |
|
5 | | -* ldap和rmi随机绑定端口 |
6 | | -* Javafx的ui |
7 | | -* 多线程 |
8 | | -* |
9 | 16 |
|
10 | 17 |
|
11 | 18 |
|
12 | | -## 参考项目 |
| 19 | +## 📝 TODO |
| 20 | + |
| 21 | +* 支持Spring Boot Spel表达式注入 |
| 22 | +* 支持Eureka XStream deserialization RCE |
| 23 | +* 支持Fastjson 内存马注入 |
| 24 | +* 支持更多可以使用JNDI内存马注入反序列化漏洞 |
| 25 | +* 支持内存马路径和密码修改 |
| 26 | + |
| 27 | +........ |
| 28 | + |
| 29 | + |
| 30 | + |
| 31 | + |
| 32 | +---- |
| 33 | + |
| 34 | +## :dragon:来龙去脉 |
| 35 | + |
| 36 | +项目是根据[Spring Boot Vulnerability Exploit Check List](https://github.com/LandGrey/SpringBootVulExploit)清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。 |
| 37 | + |
| 38 | + |
| 39 | + |
| 40 | +---- |
| 41 | + |
| 42 | + |
| 43 | + |
| 44 | +## :zap: 下载安装 |
| 45 | + |
| 46 | +1. 从[releases](https://github.com/SummerSec/SpringBootExploit/releases)下载最新版Spring Boot Exploit压缩包,配合[JNDIExploit](https://github.com/SummerSec/JNDIExploit)使用。(:star:推荐) |
| 47 | +2. |
| 48 | + 1. git clone https://github.com/SummerSec/SpringBootExploit |
| 49 | + 2. git clone https://github.com/SummerSec/JNDIExploit |
| 50 | + 3. mvn clean package -DskipTests 分别打SpringBootExploit包和JNDIExploit |
| 51 | + |
| 52 | + |
| 53 | + |
| 54 | +---- |
| 55 | + |
| 56 | +## :clapper:使用方法 |
| 57 | + |
| 58 | +1. 首先在服务器上上传打包好的JNDIExploit工具,解压。使用命令启动java -jar JNDIExploit-1.2-SNAPSHOT.jar -i vps-ip -l 1389 -p 3456 (:star:1389 3456 端口不可变,否则会漏洞利用失败) |
| 59 | +2. 输入目标地址和配置服务器地址,点击连接。出现如下图所示代表连接成功。 |
| 60 | + |
| 61 | + |
| 62 | + |
| 63 | + |
| 64 | + |
| 65 | +3. 漏洞利用 |
| 66 | + |
| 67 | + 建议首先点击检测环境,会自动判断是否存在漏洞。漏洞验证方法是Check list的方法,如果有更好的方法可以提交工单会考虑添加。 |
| 68 | + |
| 69 | +  |
| 70 | + |
| 71 | + 4. 漏洞利用,目前只支持内存马注入 |
| 72 | + |
| 73 | +  |
| 74 | + |
| 75 | + |
| 76 | + |
| 77 | + |
| 78 | + |
| 79 | + |
| 80 | + |
| 81 | +---- |
| 82 | + |
| 83 | + |
| 84 | + |
| 85 | +## :book: 参考项目 |
13 | 86 |
|
14 | 87 | https://github.com/woodpecker-appstore/springboot-vuldb |
| 88 | + |
0 commit comments