Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-22947

KEV EPSS 94.46% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-22947

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
VMware Spring Cloud Gateway 代码注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
VMware Spring Cloud Gateway是美国威睿(VMware)公司的提供了一个用于在 Spring WebFlux 之上构建 API 网关的库。 VMware Spring Cloud Gateway 存在代码注入漏洞,远程攻击者可利用该漏洞发出恶意的请求并允许在远程主机上执行任意远程命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-Spring Cloud Gateway Spring cloud gateway versions 3.1.x prior to 3.1.1+, 3.0.x prior to 3.0.7+ and all old and unsupported versions -

II. Public POCs for CVE-2022-22947

#POC DescriptionSource LinkShenlong Link
1CVE-2022-22947https://github.com/lucksec/Spring-Cloud-Gateway-CVE-2022-22947POC Details
2poc for cve-2022-22947https://github.com/scopion/cve-2022-22947POC Details
3Spring cloud gateway code injection : CVE-2022-22947https://github.com/Vulnmachines/spring-cve-2022-22947POC Details
4Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947https://github.com/Axx8/CVE-2022-22947_Rce_ExpPOC Details
5Spring Cloud Gateway < 3.0.7 & < 3.1.1 Code Injection (RCE)https://github.com/crowsec-edtech/CVE-2022-22947POC Details
6SpringCloudGatewayRCE - CVE-2022-22947 / Code By:Tas9erhttps://github.com/Tas9er/SpringCloudGatewayRCEPOC Details
7Nonehttps://github.com/Greetdawn/CVE-2022-22947POC Details
8Spring Cloud Gateway远程代码执行漏洞https://github.com/Summer177/Spring-Cloud-Gateway-CVE-2022-22947POC Details
9Exphttps://github.com/BerMalBerIst/CVE-2022-22947POC Details
10CVE-2021-42013批量https://github.com/tangxiaofeng7/CVE-2022-22947-Spring-Cloud-GatewayPOC Details
11 cve-2022-22947 spring cloud gateway 批量扫描脚本https://github.com/dingxiao77/-cve-2022-22947-POC Details
12日常更新一些顺手写的gobypoc,包含高危害EXPhttps://github.com/flying0er/CVE-2022-22947-gobyPOC Details
13Spring Cloud Gateway Actuator API 远程命令执行 CVE-2022-22947https://github.com/dbgee/CVE-2022-22947POC Details
14Spring-Cloud-Gateway-CVE-2022-22947https://github.com/nu0l/cve-2022-22947POC Details
15CVE-2022-22947批量检测脚本,回显命令没进行正则,大佬们先用着,后续再更https://github.com/nanaao/CVE-2022-22947-POCPOC Details
16批量url检测Spring-Cloud-Gateway-CVE-2022-22947https://github.com/hunzi0/CVE-2022-22947-Rce_POCPOC Details
17Nonehttps://github.com/22ke/CVE-2022-22947POC Details
18Spring Cloud Gateway远程代码执行漏洞POC,基于命令执行的基础上,增加了反弹shell操作https://github.com/M0ge/CVE-2022-22947-Spring-Cloud-Gateway-SpelRCEPOC Details
19Spring Cloud Gateway Actuator API SpEL表达式注入命令执行(CVE-2022-22947)批量检测工具https://github.com/YutuSec/SpELPOC Details
20SpringCloudGatewayRCE / Code By:Jun_shenghttps://github.com/Jun-5heng/CVE-2022-22947POC Details
21Nonehttps://github.com/darkb1rd/cve-2022-22947POC Details
22Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)https://github.com/mrknow001/CVE-2022-22947POC Details
23CVE-2022-22947_EXP,CVE-2022-22947_RCE,CVE-2022-22947反弹shell,CVE-2022-22947 getshellhttps://github.com/aodsec/CVE-2022-22947POC Details
24调试代码包含断点信息,直接导入即可进行调试https://github.com/ba1ma0/Spring-Cloud-GateWay-CVE-2022-22947-demon-codePOC Details
25CVE-2022-22947 Exploit scripthttps://github.com/Arrnitage/CVE-2022-22947_expPOC Details
26Nonehttps://github.com/PaoPaoLong-lab/Spring-CVE-2022-22947-POC Details
27cve-2022-22947-dockerhttps://github.com/hh-hunter/cve-2022-22947-dockerPOC Details
28spring-cloud-gateway-rce CVE-2022-22947https://github.com/k3rwin/spring-cloud-gateway-rcePOC Details
29Nonehttps://github.com/bysinks/CVE-2022-22947POC Details
30CVE-2022-22947_POC_EXPhttps://github.com/Wrin9/CVE-2022-22947POC Details
31CVE-2022-22947 memshellhttps://github.com/viemsr/spring_cloud_gateway_memshellPOC Details
32Nonehttps://github.com/Enokiy/cve-2022-22947-spring-cloud-gatewayPOC Details
33poc for CVE-2022-22947https://github.com/Nathaniel1025/CVE-2022-22947POC Details
34Nonehttps://github.com/Vancomycin-g/CVE-2022-22947POC Details
35Nonehttps://github.com/scopion/CVE-2022-22947-expPOC Details
36Spring Cloud Gateway RCE - CVE-2022-22947 https://github.com/sagaryadav8742/springcloudRCEPOC Details
37Spring Cloud Gateway Actuator API SpEL Code Injection.https://github.com/fbion/CVE-2022-22947POC Details
38Spring-Cloud-Gateway-CVE-2022-22947https://github.com/talentsec/Spring-Cloud-Gateway-CVE-2022-22947POC Details
39CVE-2022-22947 reproducehttps://github.com/aesm1p/CVE-2022-22947-POC-ReproducePOC Details
40Spring-Cloud-Spel-RCEhttps://github.com/4nNns/CVE-2022-22947POC Details
41burp被动扫描插件,目前只有CVE-2022-22947https://github.com/expzhizhuo/Burp_VulPscanPOC Details
42Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)https://github.com/twseptian/cve-2022-22947POC Details
43CVE-2022-22947 注入Godzilla内存马https://github.com/whwlsfb/cve-2022-22947-godzilla-memshellPOC Details
44Spring Cloud Gateway Actuator API SpEL表达式注入命令执行(CVE-2022-22947) 注入哥斯拉内存马https://github.com/0730Nophone/CVE-2022-22947-POC Details
45一个可单独、批量验证的脚本,也可以反弹shellhttps://github.com/anansec/CVE-2022-22947_EXPPOC Details
46Nonehttps://github.com/Wrong-pixel/CVE-2022-22947-expPOC Details
47批量检测Spring Cloud Gateway 远程代码执行漏洞 Spring_Cloud_Gateway_RCE_POC-CVE-2022-22947https://github.com/stayfoolish777/CVE-2022-22947-POCPOC Details
48Nacos下Spring-Cloud-Gateway CVE-2022-22947利用环境https://github.com/B0rn2d/Spring-Cloud-Gateway-NacosPOC Details
49Nonehttps://github.com/kmahyyg/CVE-2022-22947POC Details
50Nonehttps://github.com/LY613313/CVE-2022-22947POC Details
51Nonehttps://github.com/SiJiDo/CVE-2022-22947POC Details
52Nonehttps://github.com/qq87234770/CVE-2022-22947POC Details
53CVE-2022-22947注入哥斯拉内存马https://github.com/Zh0um1/CVE-2022-22947POC Details
54121https://github.com/wallbreak1991/cve-2022-22947POC Details
55Spring Cloud Gateway Actuator API SpEL表达式注入命令执行Exphttps://github.com/Le1a/CVE-2022-22947POC Details
56CVE-2022-22947_EXP,CVE-2022-22947_RCE,CVE-2022-22947反弹shell,CVE-2022-22947 getshellhttps://github.com/0x7eTeam/CVE-2022-22947POC Details
57一款Spring综合漏洞的利用工具,工具目前支持Spring Cloud Gateway RCE(CVE-2022-22947)、Spring Framework RCE (CVE-2022-22965) 的检测以及利用https://github.com/charonlight/SpringExploitGUIPOC Details
58CVE-2022-22947 exploit scripthttps://github.com/cc3305/CVE-2022-22947POC Details
59Nonehttps://github.com/Sumitpathania03/CVE-2022-22947POC Details
60Applications using Spring Cloud Gateway prior to 3.1.1+ and 3.0.7+ are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-22947.yamlPOC Details
61Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Spring%20Cloud%20Gateway%20Actuator%20API%20SpEL%E8%A1%A8%E8%BE%BE%E5%BC%8F%E6%B3%A8%E5%85%A5%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%20CVE-2022-22947.mdPOC Details
62https://github.com/vulhub/vulhub/blob/master/spring/CVE-2022-22947/README.mdPOC Details
63Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947https://github.com/SecNN/CVE-2022-22947_Rce_ExpPOC Details
64burp被动扫描插件,目前只有CVE-2022-22947https://github.com/kkx600/Burp_VulPscanPOC Details
65一个由AI生成的漏洞验证应用https://github.com/skysliently/CVE-2022-22947-pb-aiPOC Details
66Nonehttps://github.com/shoucheng3/spring-cloud__spring-cloud-gateway_CVE-2022-22947_3-0-6POC Details
67Spring Cloud Gateway远程代码执行漏洞POC,基于命令执行的基础上,增加了反弹shell操作https://github.com/MoCh3n/CVE-2022-22947-Spring-Cloud-Gateway-SpelRCEPOC Details
68一款Spring综合漏洞的利用工具,工具目前支持Spring Cloud Gateway RCE(CVE-2022-22947)、Spring Framework RCE (CVE-2022-22965) 的检测以及利用https://github.com/superneilcn/SpringExploitGUIPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-22947

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-03-03 · 37 CVEs total

CVE-2021-458196.4 MEDIUMWordline HIDCCEMonitorSVC 代码问题漏洞
CVE-2021-3609Linux kernel 竞争条件问题漏洞
CVE-2022-26127FRRouting FRR 缓冲区错误漏洞
CVE-2022-26128FRRouting FRR 缓冲区错误漏洞
CVE-2022-26129FRRouting FRR 缓冲区错误漏洞
CVE-2022-23898MingSoft Mcms SQL注入漏洞
CVE-2022-23899MingSoft Mcms SQL注入漏洞
CVE-2022-25125MingSoft Mcms SQL注入漏洞
CVE-2022-22700CyberArk Identity 安全特征问题漏洞
CVE-2021-3620Red Hat Ansible 安全漏洞
CVE-2022-25138Axelor Open Suite 跨站脚本漏洞
CVE-2021-3602Buildah 信息泄露漏洞
CVE-2021-3762Clair 路径遍历漏洞
CVE-2021-4002Linux kernel 安全漏洞
CVE-2022-23051PeTeReport 跨站脚本漏洞
CVE-2022-23052PeTeReport 跨站请求伪造漏洞
CVE-2022-25220PeTeReport 跨站脚本漏洞
CVE-2022-22943VMware Tools for Windows 代码问题漏洞
CVE-2021-3640Linux kernel 资源管理错误漏洞
CVE-2022-23849Devolutions Password Hub 授权问题漏洞

Showing top 20 of 37 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2022-22947

No comments yet


Leave a comment