Testing CVE-2022-22968# spring-rce-poc
Testing CVE-2022-22968
Simple app vulnerable to CVE-2022-22968
- `Dockerfile` could be used to build it on vulnerable version of `Tomcat (9.0.59)`
- `exploit.sh` is a shell script which is trying to exploit this cve on 8080 port of localhost
If attack with `exploit.sh` was succesfull, on context of `http://localhost:8080/shell.jsp` on a target app should be accessible
simple JSP website with basic webshell.
[4.0K] /data/pocs/3681428af9675673d3cb2e3d8365ae518a9a9c43
├── [ 113] Dockerfile
├── [2.9K] exploit.sh
├── [1.8K] pom.xml
├── [ 438] README.md
├── [ 150] run.sh
└── [4.0K] src
└── [4.0K] main
├── [4.0K] java
│ └── [4.0K] com
│ └── [4.0K] pbiot
│ └── [4.0K] springrce
│ ├── [ 735] HelloController.java
│ ├── [ 571] Message.java
│ └── [ 679] SpringRceApplication.java
└── [4.0K] resources
├── [ 1] application.properties
└── [4.0K] templates
└── [ 299] hello.html
8 directories, 10 files