- Notifications
You must be signed in to change notification settings - Fork759
Java web common vulnerabilities and security code which is base on springboot and spring security
JoyChou93/java-sec-code
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
Java sec code is a very powerful and friendly project for learning Java vulnerability code.
中文文档 😋
Alibaba-Security attack and defense/research(P5-P7)
This project can also be called Java vulnerability code.
Each vulnerability type code has a security vulnerability by default unless there is no vulnerability. The relevant fix code is in the comments or code. Specifically, you can view each vulnerability code and comments.
Due to the server expiration, the online demo site had to go offline.
Login username & password:
admin/admin123joychou/joychou123Sort by letter.
- Actuators to RCE
- CommandInject
- CORS
- CRLF Injection
- CSRF
- CVE-2022-22978
- Deserialize
- Fastjson
- File Upload
- GetRequestURI
- IP Forge
- Java RMI
- JSONP
- Log4j
- ooxmlXXE
- PathTraversal
- QLExpress
- RCE
- Runtime
- ProcessBuilder
- ScriptEngine
- Yaml Deserialize
- Groovy
- Shiro
- Swagger
- SpEL
- SQL Injection
- SSRF
- SSTI
- URL Redirect
- URL whitelist Bypass
- xlsxStreamerXXE
- XSS
- XStream
- XXE
- JWT
- Actuators to RCE
- CORS
- CSRF
- Deserialize
- Fastjson
- Java RMI
- JSONP
- POI-OOXML XXE
- SQLI
- SSRF
- SSTI
- URL whitelist Bypass
- XXE
- JWT
- Others
The application will use mybatis auto-injection. Please run mysql server ahead of time and configure the mysql server database's name and username/password except docker environment.
spring.datasource.url=jdbc:mysql://127.0.0.1:3306/java_sec_codespring.datasource.username=rootspring.datasource.password=woshishujukumima- Docker
- IDEA
- Tomcat
- JAR
Start docker:
docker-compose pulldocker-compose upStop docker:
docker-compose downDocker's environment:
- Java 1.8.0_102
- Mysql 8.0.17
- Tomcat 8.5.11
git clone https://github.com/JoyChou93/java-sec-code- Open in IDEA and click
runbutton.
Example:
http://localhost:8080/rce/exec?cmd=whoamireturn:
Viarusgit clone https://github.com/JoyChou93/java-sec-code&cd java-sec-code- Build war package by
mvn clean package. - Copy war package to tomcat webapps directory.
- Start tomcat application.
Example:
http://localhost:8080/java-sec-code-1.0.0/rce/runtime/exec?cmd=whoamireturn:
ViarusChangewar tojar inpom.xml.
<groupId>sec</groupId><artifactId>java-sec-code</artifactId><version>1.0.0</version><packaging>war</packaging>
Build package and run.
git clone https://github.com/JoyChou93/java-sec-codecd java-sec-codemvn clean package -DskipTests java -jar target/java-sec-code-1.0.0.jarIf you are not logged in, accessing any page will redirect you to the login page. The username & password are as follows.
admin/admin123joychou/joychou123Tomcat's default JSESSION session is valid for 30 minutes, so a 30-minute non-operational session will expire. In order to solve this problem, the rememberMe function is introduced, and the default expiration time is 2 weeks.
Core developers :JoyChou,liergou9981Other developers:lightless,Anemone95,waderwu.
If you like the poject, you can star java-sec-code project to support me. With your support, I will be able to makeJava sec code better 😎.
About
Java web common vulnerabilities and security code which is base on springboot and spring security
Topics
Resources
Uh oh!
There was an error while loading.Please reload this page.
Stars
Watchers
Forks
Packages0
Uh oh!
There was an error while loading.Please reload this page.
Contributors4
Uh oh!
There was an error while loading.Please reload this page.