PoC-in-GitHub/2022/CVE-2022-41678.json
2025-11-24 03:42:49 +09:00

72 lines
No EOL
2.6 KiB
JSON

[
{
"id": 895756163,
"name": "CVE-2022-41678",
"full_name": "mbadanoiu\/CVE-2022-41678",
"owner": {
"login": "mbadanoiu",
"id": 18383407,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
"html_url": "https:\/\/github.com\/mbadanoiu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2022-41678",
"description": "CVE-2022-41678: Dangerous MBeans Accessible via Jolokia API in Apache ActiveMQ",
"fork": false,
"created_at": "2024-11-28T20:48:21Z",
"updated_at": "2025-11-23T15:19:24Z",
"pushed_at": "2024-11-28T22:20:37Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0-day",
"authenticated",
"cve",
"cve-2022-41678",
"cves",
"log4jmx",
"remote-code-execution"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 1076189202,
"name": "CVE-2022-41678",
"full_name": "URJACK2025\/CVE-2022-41678",
"owner": {
"login": "URJACK2025",
"id": 221416188,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/221416188?v=4",
"html_url": "https:\/\/github.com\/URJACK2025",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/URJACK2025\/CVE-2022-41678",
"description": "CVE-2022-41678 是 Apache ActiveMQ 中的一个远程代码执行漏洞。该漏洞允许攻击者通过 JMX (Java Management Extensions) 接口修改 Log4j 配置或 JFR (Java Flight Recorder) 配置,从而写入恶意的 JSP webshell 到服务器的 web 目录中,最终实现远程代码执行。",
"fork": false,
"created_at": "2025-10-14T14:18:48Z",
"updated_at": "2025-11-15T15:28:15Z",
"pushed_at": "2025-10-14T15:18:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]