Lucene search

K
kitploitKitPloitKITPLOIT:6278364996548285306
HistoryApr 24, 2022 - 9:30 p.m.

Spring4Shell-Scan - A Fully Automated, Reliable, And Accurate Scanner For Finding Spring4Shell And Spring Cloud RCE Vulnerabilities

2022-04-2421:30:00
www.kitploit.com
513

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.975 High

EPSS

Percentile

100.0%

A fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilities

Features

  • Support for lists of URLs.
  • Fuzzing for more than 10 new Spring4Shell payloads (previously seen tools uses only 1-2 variants).
  • Fuzzing for HTTP GET and POST methods.
  • Automatic validation of the vulnerability upon discovery.
  • Randomized and non-intrusive payloads.
  • WAF Bypass payloads.

Description

The Spring4Shell RCE is a critical vulnerability that FullHunt has been researching since it was released. We worked with our customers in scanning their environments for Spring4Shell and Spring Cloud RCE vulnerabilities.

We’re open-sourcing an open detection scanning tool for discovering Spring4Shell (CVE-2022-22965) and Spring Cloud RCE (CVE-2022-22963) vulnerabilities. This shall be used by security teams to scan their infrastructure, as well as test for WAF bypasses that can result in achieving successful exploitation of the organization’s environment.

If your organization requires help, please contact (team at fullhunt.io) directly for a full attack surface discovery and scanning for the Spring4Shell vulnerabilities.

Usage

Management Platform. [•] Secure your External Attack Surface with FullHunt.io. usage: spring4shell-scan.py [-h] [-u URL] [-p PROXY] [-l USEDLIST] [–payloads-file PAYLOADS_FILE] [–waf-bypass] [–request-type REQUEST_TYPE] [–test-CVE-2022-22963] optional arguments: -h, --help show this help message and exit -u URL, --url URL Check a single URL. -p PROXY, --proxy PROXY Send requests through proxy -l USEDLIST, --list USEDLIST Check a list of URLs. --payloads-file PAYLOADS_FILE Payloads file - [default: payloads.txt]. --waf-bypass Extend scans with WAF bypass payloads. --request-type REQUEST_TYPE Request Type: (get, post, all) - [Default: all]. --test-CVE-2022-22963 Test for CVE-2022-22963 (Spring Cloud RCE). ">

$ ./spring4shell-scan.py -h  
[•] CVE-2022-22965 - Spring4Shell RCE Scanner  
[•] Scanner provided by FullHunt.io - The Next-Gen Attack Surface Management Platform.  
[•] Secure your External Attack Surface with FullHunt.io.  
usage: spring4shell-scan.py [-h] [-u URL] [-p PROXY] [-l USEDLIST] [--payloads-file PAYLOADS_FILE] [--waf-bypass] [--request-type REQUEST_TYPE] [--test-CVE-2022-22963]  
  
optional arguments:  
  -h, --help            show this help message and exit  
  -u URL, --url URL     Check a single URL.  
  -p PROXY, --proxy PROXY  
                        Send requests through proxy  
  -l USEDLIST, --list USEDLIST  
                        Check a list of URLs.  
  --payloads-file PAYLOADS_FILE  
                        Payloads file - [default: payloads.txt].  
  --waf-bypass          Extend scans with WAF bypass payloads.  
  --request-type REQUEST_TYPE  
                        Request Type: (get,    post, all) - [Default: all].  
  --test-CVE-2022-22963  
                        Test for CVE-2022-22963 (Spring Cloud RCE).

Scan a Single URL

$ python3 spring4shell-scan.py -u https://spring4shell.lab.secbot.local

Discover WAF bypasses against the environment

$ python3 spring4shell-scan.py -u https://spring4shell.lab.secbot.local --waf-bypass

Scan a list of URLs

$ python3 spring4shell-scan.py -l urls.txt

Include checks for Spring Cloud RCE (CVE-2022-22963)

$ python3 spring4shell-scan.py -l urls.txt --test-CVE-2022-22963  

Installation

$ pip3 install -r requirements.txt  

Docker Support

git clone https://github.com/fullhunt/spring4shell-scan.git  
cd spring4shell-scan  
sudo docker build -t spring4shell-scan .  
sudo docker run -it --rm spring4shell-scan  
  
# With URL list "urls.txt" in current directory  
docker run -it --rm -v $PWD:/data spring4shell-scan -l /data/urls.txt

About FullHunt

FullHunt is the next-generation attack surface management (ASM) platform. FullHunt enables companies to discover all of their attack surfaces, monitor them for exposure, and continuously scan them for the latest security vulnerabilities. All, in a single platform, and more.

FullHunt provides an enterprise platform for organizations. The FullHunt Enterprise Platform provides extended scanning and capabilities for customers. FullHunt Enterprise platform allows organizations to closely monitor their external attack surface, and get detailed alerts about every single change that happens. Organizations around the world use the FullHunt Enterprise Platform to solve their continuous security and external attack surface security challenges.

Legal Disclaimer

This project is made for educational and ethical testing purposes only. Usage of spring4shell-scan for attacking targets without prior mutual consent is illegal. It is the end user’s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.

License

The project is licensed under MIT License.

Author

Mazin Ahmed

Download Spring4Shell-Scan

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.975 High

EPSS

Percentile

100.0%