jolokia-logback-jndi-rce: Jolokia Logback JNDI - Remote Code Execution

日期: 2025-08-01 | 影响软件: Jolokia Logback | POC: 已公开

漏洞描述

Jolokia Logback is vulnerable to RCE.

PoC代码[已公开]

id: jolokia-logback-jndi-rce

info:
  name: Jolokia Logback JNDI - Remote Code Execution
  author: SleepingBag945
  severity: high
  description: Jolokia Logback is vulnerable to RCE.
  reference:
    - https://thinkloveshare.com/hacking/ssrf_to_rce_with_jolokia_and_mbeans/
    - https://github.com/laluka/jolokia-exploitation-toolkit
    - https://github.com/LandGrey/SpringBootVulExploit#0x04jolokia-logback-jndi-rce
  metadata:
    max-request: 2
  tags: jolokia,springboot,tomcat,rce,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/jolokia/list"
      - "{{BaseURL}}/actuator/jolokia/list"

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'ch.qos.logback.classic.jmx.JMXConfigurator'
          - 'reloadByURL'
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100e671049eba029e2e7d73f239c7e2015aa88131844ede02a9e4ceb866af780968022047219ce25addc1da0ab1fa6c4704004aca02751af8bbafb58a28da271a88c3f7:922c64590222798bb761d5b6d8e72950

相关漏洞推荐