-
Notifications
You must be signed in to change notification settings - Fork 2
Expand file tree
/
Copy pathdocker-compose.yml
More file actions
63 lines (59 loc) · 1.54 KB
/
docker-compose.yml
File metadata and controls
63 lines (59 loc) · 1.54 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
services:
# Tika with Woodstox (NOT vulnerable - Woodstox correctly handles XMLResolver)
tika-with-woodstox:
build:
context: ./vulnerable-tika
dockerfile: Dockerfile
container_name: tika-with-woodstox
ports:
- "9998:9998"
networks:
- vuln-network
restart: unless-stopped
# VULNERABLE Tika - JDK StAX parser only (no Woodstox)
# This simulates embedded deployments that don't have Woodstox on classpath
tika-vulnerable:
build:
context: ./vulnerable-tika
dockerfile: Dockerfile.jdk-stax
container_name: tika-vulnerable
ports:
- "9997:9998"
networks:
- vuln-network
restart: unless-stopped
# Demo Web Application (file upload service using Tika)
webapp:
build:
context: ./webapp
dockerfile: Dockerfile
container_name: webapp-cve-2025-66516
ports:
- "8080:8080"
environment:
- TIKA_SERVER_URL=http://tika-vulnerable:9998
depends_on:
- tika-vulnerable
- tika-with-woodstox
networks:
- vuln-network
volumes:
- ./webapp/uploads:/app/uploads
- ./webapp/secrets:/app/secrets:ro
restart: unless-stopped
# Attacker's listener server (to receive exfiltrated data)
attacker-listener:
image: python:3.11-slim
container_name: attacker-listener
ports:
- "9999:9999"
networks:
- vuln-network
working_dir: /listener
volumes:
- ./attacker:/listener
command: python -m http.server 9999
restart: unless-stopped
networks:
vuln-network:
driver: bridge