[ { "id": 553040165, "name": "CVE-2022-42889", "full_name": "standb\/CVE-2022-42889", "owner": { "login": "standb", "id": 17493969, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17493969?v=4", "html_url": "https:\/\/github.com\/standb" }, "html_url": "https:\/\/github.com\/standb\/CVE-2022-42889", "description": "CVE-2022-42889 dockerized sample application (Apache Commons Text RCE)", "fork": false, "created_at": "2022-10-17T16:07:50Z", "updated_at": "2022-10-18T12:35:44Z", "pushed_at": "2022-10-17T16:09:23Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "cve", "cve-2022-42889", "poc", "rce" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 553123200, "name": "CVE-2022-42889-PoC", "full_name": "SeanWrightSec\/CVE-2022-42889-PoC", "owner": { "login": "SeanWrightSec", "id": 41480796, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41480796?v=4", "html_url": "https:\/\/github.com\/SeanWrightSec" }, "html_url": "https:\/\/github.com\/SeanWrightSec\/CVE-2022-42889-PoC", "description": "Proof of Concept for the Apache commons-text vulnerability CVE-2022-42889.", "fork": false, "created_at": "2022-10-17T18:50:36Z", "updated_at": "2022-10-20T16:11:39Z", "pushed_at": "2022-10-20T11:56:13Z", "stargazers_count": 18, "watchers_count": 18, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-42889", "cve-2022-42889-expliot", "cybersecurity", "poc" ], "visibility": "public", "forks": 7, "watchers": 18, "score": 0 }, { "id": 553199087, "name": "text4shell-policy", "full_name": "chainguard-dev\/text4shell-policy", "owner": { "login": "chainguard-dev", "id": 87436699, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87436699?v=4", "html_url": "https:\/\/github.com\/chainguard-dev" }, "html_url": "https:\/\/github.com\/chainguard-dev\/text4shell-policy", "description": "ClusterImagePolicy demo for cve-2022-42889 text4shell ", "fork": false, "created_at": "2022-10-17T21:49:13Z", "updated_at": "2022-10-18T15:27:00Z", "pushed_at": "2022-10-18T11:13:53Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 553446275, "name": "commons-text-goat", "full_name": "tulhan\/commons-text-goat", "owner": { "login": "tulhan", "id": 586439, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/586439?v=4", "html_url": "https:\/\/github.com\/tulhan" }, "html_url": "https:\/\/github.com\/tulhan\/commons-text-goat", "description": "An intentionally vulnerable webapp to get your hands dirty with CVE-2022-42889.", "fork": false, "created_at": "2022-10-18T08:22:55Z", "updated_at": "2022-10-19T01:00:46Z", "pushed_at": "2022-10-18T08:22:56Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 553496497, "name": "cve-2022-42889-text4shell-docker", "full_name": "karthikuj\/cve-2022-42889-text4shell-docker", "owner": { "login": "karthikuj", "id": 59091280, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59091280?v=4", "html_url": "https:\/\/github.com\/karthikuj" }, "html_url": "https:\/\/github.com\/karthikuj\/cve-2022-42889-text4shell-docker", "description": "Dockerized POC for CVE-2022-42889 Text4Shell", "fork": false, "created_at": "2022-10-18T09:58:00Z", "updated_at": "2022-10-20T15:22:26Z", "pushed_at": "2022-10-18T10:00:27Z", "stargazers_count": 29, "watchers_count": 29, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "act4shell", "apache", "commons", "cve", "cve-2022-42889", "poc", "text4shell" ], "visibility": "public", "forks": 6, "watchers": 29, "score": 0 }, { "id": 553621408, "name": "cve-2022-42889", "full_name": "ClickCyber\/cve-2022-42889", "owner": { "login": "ClickCyber", "id": 66947475, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66947475?v=4", "html_url": "https:\/\/github.com\/ClickCyber" }, "html_url": "https:\/\/github.com\/ClickCyber\/cve-2022-42889", "description": "cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text version 1.10. ", "fork": false, "created_at": "2022-10-18T13:53:55Z", "updated_at": "2022-10-20T06:59:02Z", "pushed_at": "2022-10-18T14:10:07Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 5, "score": 0 }, { "id": 553879048, "name": "CVE-2022-42889-POC", "full_name": "korteke\/CVE-2022-42889-POC", "owner": { "login": "korteke", "id": 2558348, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2558348?v=4", "html_url": "https:\/\/github.com\/korteke" }, "html_url": "https:\/\/github.com\/korteke\/CVE-2022-42889-POC", "description": "A simple application that shows how to exploit the CVE-2022-42889 vulnerability", "fork": false, "created_at": "2022-10-18T23:15:40Z", "updated_at": "2022-10-19T06:40:58Z", "pushed_at": "2022-10-19T13:22:16Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 554046000, "name": "cve-2022-42889-check", "full_name": "eunomie\/cve-2022-42889-check", "owner": { "login": "eunomie", "id": 1542321, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1542321?v=4", "html_url": "https:\/\/github.com\/eunomie" }, "html_url": "https:\/\/github.com\/eunomie\/cve-2022-42889-check", "description": null, "fork": false, "created_at": "2022-10-19T06:54:57Z", "updated_at": "2022-10-19T06:57:07Z", "pushed_at": "2022-10-20T12:54:56Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 554185839, "name": "CVE-2022-42889-text4shell", "full_name": "kljunowsky\/CVE-2022-42889-text4shell", "owner": { "login": "kljunowsky", "id": 104329412, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104329412?v=4", "html_url": "https:\/\/github.com\/kljunowsky" }, "html_url": "https:\/\/github.com\/kljunowsky\/CVE-2022-42889-text4shell", "description": "Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.", "fork": false, "created_at": "2022-10-19T11:49:08Z", "updated_at": "2022-10-20T13:39:35Z", "pushed_at": "2022-10-19T13:42:37Z", "stargazers_count": 10, "watchers_count": 10, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "bug-bounty", "bug-bounty-hunting", "bugbounty", "bugbounty-tool", "commons-text", "cve-2022-42889", "exploit", "oneliner", "security", "security-tools" ], "visibility": "public", "forks": 0, "watchers": 10, "score": 0 }, { "id": 554436866, "name": "text4shell-scan", "full_name": "securekomodo\/text4shell-scan", "owner": { "login": "securekomodo", "id": 4809643, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4809643?v=4", "html_url": "https:\/\/github.com\/securekomodo" }, "html_url": "https:\/\/github.com\/securekomodo\/text4shell-scan", "description": "A fully automated, accurate, and extensive scanner for finding text4shell RCE CVE-2022-42889", "fork": false, "created_at": "2022-10-19T20:14:22Z", "updated_at": "2022-10-20T17:13:42Z", "pushed_at": "2022-10-20T12:51:08Z", "stargazers_count": 9, "watchers_count": 9, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 9, "score": 0 }, { "id": 554494424, "name": "CVE-2022-42889", "full_name": "neerazz\/CVE-2022-42889", "owner": { "login": "neerazz", "id": 43318996, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43318996?v=4", "html_url": "https:\/\/github.com\/neerazz" }, "html_url": "https:\/\/github.com\/neerazz\/CVE-2022-42889", "description": null, "fork": false, "created_at": "2022-10-19T22:56:12Z", "updated_at": "2022-10-19T22:59:21Z", "pushed_at": "2022-10-19T22:58:32Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-42889", "cve-2022-42889-expliot", "cve-poc" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 554822047, "name": "cve-2022-42889-intercept", "full_name": "uk0\/cve-2022-42889-intercept", "owner": { "login": "uk0", "id": 19545292, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19545292?v=4", "html_url": "https:\/\/github.com\/uk0" }, "html_url": "https:\/\/github.com\/uk0\/cve-2022-42889-intercept", "description": "通过 jvm 启动参数 以及 jps pid进行拦截非法参数", "fork": false, "created_at": "2022-10-20T13:05:24Z", "updated_at": "2022-10-20T14:52:55Z", "pushed_at": "2022-10-20T13:45:10Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 } ]