Skip to content

Latest commit

 

History

History
25 lines (16 loc) · 1.3 KB

README.md

File metadata and controls

25 lines (16 loc) · 1.3 KB

Spring4Shell sample vulnerable application

This is a dockerized application that is vulnerable to the Spring4Shell vulnerability (CVE-2022-22965). Full Java source for the war is provided and modifiable, the war will get re-built whenever the docker image is built. The built WAR will then be loaded by Tomcat. There is nothing special about this application, it's a simple hello world that's based off Spring tutorials.

Details: https://www.lunasec.io/docs/blog/spring-rce-vulnerabilities

Run

docker run -p 8080:8080 -p 8000:8000 --rm ghcr.io/denniskniep/vulnerable-app-spring4shell:latest

App should now be available at http://localhost:8080/helloworld/greeting WebPage

Build it yourself

  1. Clone the repository
  2. Build and run the container: docker build . -t spring4shell && docker run --rm -p 8080:8080 -p 8000:8000 spring4shell

Credits