I understand that popular exploits for Sping4Shell are performed by submitting HTTP POST requests with form data that attempts to get server-side data-binding code to alter a classLoader field. How do I construct this request?
CodePudding user response:
There are many GitHub projects, which maintain code for testing for those vulnerabilities. For example this one.
Study the source code and rebuild it in a language you fancy. Or use it out of the box. There are also solutions, which run in Docker, so no additional resources are needed.