In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Java(3 tweets) Linux(1 tweets) OpenSSL(1 tweets)
List of frequently cited URLs
List of frequently cited URLs
Name | URL |
---|---|
dinosn/CVE-2022-22963 | https://github.com/dinosn/CVE-2022-22963 |
darryk10/CVE-2022-22963 | https://github.com/darryk10/CVE-2022-22963 |
hktalent/spring-spel-0day-poc | https://github.com/hktalent/spring-spel-0day-poc |
jschauma/check-springshell | https://github.com/jschauma/check-springshell |
exploitbin/CVE-2022-22963-Spring-Core-RCE | https://github.com/exploitbin/CVE-2022-22963-Spring-Core-RCE |
SealPaPaPa/SpringCloudFunction-Research | https://github.com/SealPaPaPa/SpringCloudFunction-Research |
k3rwin/spring-cloud-function-rce | https://github.com/k3rwin/spring-cloud-function-rce |
AayushmanThapaMagar/CVE-2022-22963 | https://github.com/AayushmanThapaMagar/CVE-2022-22963 |
Anonymous-ghost/AttackWebFrameworkTools-5.0 | https://github.com/Anonymous-ghost/AttackWebFrameworkTools-5.0 |
XuCcc/VulEnv | https://github.com/XuCcc/VulEnv |
Name | URL |
---|---|
dinosn/CVE-2022-22963 | github.com |
darryk10/CVE-2022-22963 | github.com |
hktalent/spring-spel-0day-poc | github.com |
jschauma/check-springshell | github.com |
exploitbin/CVE-2022-22963-Spring-Core-RCE | github.com |
SealPaPaPa/SpringCloudFunction-Research | github.com |
k3rwin/spring-cloud-function-rce | github.com |
AayushmanThapaMagar/CVE-2022-22963 | github.com |
Anonymous-ghost/AttackWebFrameworkTools-5.0 | github.com |
XuCcc/VulEnv | github.com |