Skip to content

A PoC for CVE-2022-34169, for the SU_PWN challenge from SUCTF 2025

Notifications You must be signed in to change notification settings

Disnaming/CVE-2022-34169

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2022-34169 PoC

A (malleable) PoC and solution for the SU_pwn challenge from SUCTF 2025. Based on this issue from the original discoverer (Felix Wilhelm) and this blog post (thanat0s). Tries not to rely as much on hard constants as the existing PoCs out there.

If you want to deliver a different java bytecode payload to e.g. bypass some WAF, just edit RCE.java. Otherwise, RCE command lives at the top of CVE-2022-34169.py.

(web.jar is the handout from SU_pwn)

Setup

docker compose up
curl -X POST -F "File=@output/target.xslt" http://localhost:8080/upload

About

A PoC for CVE-2022-34169, for the SU_PWN challenge from SUCTF 2025

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published