Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2010-1622

Description

SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.

POC

Reference

- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html

Github

- https://github.com/1nhann/spring2010

- https://github.com/ARPSyndicate/cvemon

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/Challengers-win/Sec-Interview-ai

- https://github.com/DDuarte/springshell-rce-poc

- https://github.com/E-bounce/cve-2010-1622_learning_environment

- https://github.com/Enokiy/spring-RCE-CVE-2022-22965

- https://github.com/GBMluke/Web

- https://github.com/GuayoyoCyber/CVE-2022-22965

- https://github.com/HandsomeCat00/Spring-CVE-2010-1622

- https://github.com/LudovicPatho/CVE-2022-22965_Spring4Shell

- https://github.com/Snip3R69/spring-shell-vuln

- https://github.com/Y4tacker/JavaSec

- https://github.com/cxzero/CVE-2022-22965-spring4shell

- https://github.com/gitrobtest/Java-Security

- https://github.com/gokul-ramesh/Spring4Shell-PoC-exploit

- https://github.com/j4k0m/spring4shell-secdojo

- https://github.com/kyereafrane/Malware_attack_response.

- https://github.com/mikaelkall/Spring4Shell

- https://github.com/pen4uin/awesome-vulnerability-research

- https://github.com/pen4uin/vulnerability-research

- https://github.com/pen4uin/vulnerability-research-list

- https://github.com/seal-community/patches

- https://github.com/strainerart/Spring4Shell

- https://github.com/superfish9/pt

- https://github.com/tweedge/springcore-0day-en