Share
## https://sploitus.com/exploit?id=BC3F41CB-4333-5CCE-85A9-7064DAA6019A
# CVE-2022-30190

[![N|Solid](https://socprime.com/wp-content/uploads/Follina-Zero-Day-Exploit-in-the-Wild.png)](https://nodesource.com/products/nsolid)

## Concept
>This is an implementation of Follina exploit with website interface
## Demonstration
>This the principal platform for my exploit, i m going to put my LAN Ip then my shell code that contain start calc.exe
![](images/p1.png)
>Now we can see that our server is in listening mode
![](images/p2.png)
>Here is our doc file
![](images/p3.png)
>Here we can see our shell execution of calculator started when i started my doc file
![](images/p4.png)
## ATTENTION
> I didn t manage INPUT errors , carefull when you write given informations on HTML platform
## Requirement
##### You need to have maven installed on Path variable, then you can you this software
## Installation
##### Windows
- This installation, you need to download jdk 16.0.2 , then you add bin file to the path
- Download maven zip version, then i m adding bin execution of maven to environnement variable
##### Linux
- Download jdk16.0.2
```sh
    sudo unzip jdk****.zip
    sudo dpkg -i jdk****.deb
    sudo export PATH="/usr/lib/jvm/jdk-16.0.2/bin:$PATH"
    sudo apt-get install maven
```
#####  Installation of Software
#
```sh
cd Annunaki
mvn spring-boot:run
```
##### Execution
#
>Browse on Browser link : http://localhost:5656/anunnaki