Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Java web common vulnerabilities and security code which is base on springboot and spring security

NotificationsYou must be signed in to change notification settings

JoyChou93/java-sec-code

Repository files navigation

Java sec code is a very powerful and friendly project for learning Java vulnerability code.

中文文档 😋

Recruitment

Alibaba-Security attack and defense/research(P5-P7)

Introduce

This project can also be called Java vulnerability code.

Each vulnerability type code has a security vulnerability by default unless there is no vulnerability. The relevant fix code is in the comments or code. Specifically, you can view each vulnerability code and comments.

Due to the server expiration, the online demo site had to go offline.

Login username & password:

admin/admin123joychou/joychou123

Vulnerability Code

Sort by letter.

Vulnerability Description

How to run

The application will use mybatis auto-injection. Please run mysql server ahead of time and configure the mysql server database's name and username/password except docker environment.

spring.datasource.url=jdbc:mysql://127.0.0.1:3306/java_sec_codespring.datasource.username=rootspring.datasource.password=woshishujukumima
  • Docker
  • IDEA
  • Tomcat
  • JAR

Docker

Start docker:

docker-compose pulldocker-compose up

Stop docker:

docker-compose down

Docker's environment:

  • Java 1.8.0_102
  • Mysql 8.0.17
  • Tomcat 8.5.11

IDEA

  • git clone https://github.com/JoyChou93/java-sec-code
  • Open in IDEA and clickrun button.

Example:

http://localhost:8080/rce/exec?cmd=whoami

return:

Viarus

Tomcat

  • git clone https://github.com/JoyChou93/java-sec-code &cd java-sec-code
  • Build war package bymvn clean package.
  • Copy war package to tomcat webapps directory.
  • Start tomcat application.

Example:

http://localhost:8080/java-sec-code-1.0.0/rce/runtime/exec?cmd=whoami

return:

Viarus

JAR

Changewar tojar inpom.xml.

<groupId>sec</groupId><artifactId>java-sec-code</artifactId><version>1.0.0</version><packaging>war</packaging>

Build package and run.

git clone https://github.com/JoyChou93/java-sec-codecd java-sec-codemvn clean package -DskipTests java -jar target/java-sec-code-1.0.0.jar

Authenticate

Login

http://localhost:8080/login

If you are not logged in, accessing any page will redirect you to the login page. The username & password are as follows.

admin/admin123joychou/joychou123

Logout

http://localhost:8080/logout

RememberMe

Tomcat's default JSESSION session is valid for 30 minutes, so a 30-minute non-operational session will expire. In order to solve this problem, the rememberMe function is introduced, and the default expiration time is 2 weeks.

Contributors

Core developers :JoyChou,liergou9981Other developers:lightless,Anemone95,waderwu.

Support

If you like the poject, you can star java-sec-code project to support me. With your support, I will be able to makeJava sec code better 😎.

About

Java web common vulnerabilities and security code which is base on springboot and spring security

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published

Contributors4

  •  
  •  
  •  
  •  

[8]ページ先頭

©2009-2025 Movatter.jp