Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-22965

KEV EPSS 94.43% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-22965

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Spring Framework 代码注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Spring Framework是美国Spring团队的一套开源的Java、JavaEE应用程序框架。该框架可帮助开发人员构建高质量的应用。 Spring Framework 存在代码注入漏洞,该漏洞源于 JDK 9+ 上的数据绑定的 RCE。以下产品和版本受到影响:5.3.0 至 5.3.17、5.2.0 至 5.2.19、较旧的和不受支持的版本也会受到影响。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-Spring Framework Spring Framework versions 5.3.X prior to 5.3.18+, 5.2.x prior to 5.2.20+ and all old and unsupported versions -

II. Public POCs for CVE-2022-22965

#POC DescriptionSource LinkShenlong Link
1Spring4Shell Proof Of Concept/And vulnerable application CVE-2022-22965https://github.com/BobTheShoplifter/Spring4Shell-POCPOC Details
2CVE-2022-22965 : about spring core rcehttps://github.com/Mr-xn/spring-core-rcePOC Details
3Spring4Shell - Spring Core RCE - CVE-2022-22965https://github.com/TheGejr/SpringShellPOC Details
4Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploithttps://github.com/reznok/Spring4Shell-POCPOC Details
5spring-core单个图形化利用工具,CVE-2022-22965及修复方案已出https://github.com/light-Life/CVE-2022-22965-GUItoolsPOC Details
6CVE-2022-22965 - CVE-2010-1622 reduxhttps://github.com/DDuarte/springshell-rce-pocPOC Details
7spring框架RCE漏洞 CVE-2022-22965https://github.com/k3rwin/spring-core-rcePOC Details
8springFramework_CVE-2022-22965_RCE简单利用https://github.com/liangyueliangyue/spring-core-rcePOC Details
9Nonehttps://github.com/Kirill89/CVE-2022-22965-PoCPOC Details
10Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.https://github.com/FourCoreLabs/spring4shell-exploit-pocPOC Details
11Spring Framework RCE (Quick pentest notes)https://github.com/alt3kx/CVE-2022-22965_PoCPOC Details
12Vulnerabilidad RCE en Spring Framework vía Data Binding on JDK 9+ (CVE-2022-22965 aka "Spring4Shell")https://github.com/GuayoyoCyber/CVE-2022-22965POC Details
13A Safer PoC for CVE-2022-22965 (Spring4Shell)https://github.com/colincowie/Safer_PoC_CVE-2022-22965POC Details
14Nonehttps://github.com/rwincey/spring4shell-CVE-2022-22965POC Details
15CVE-2022-22965 poc including reverse-shell supporthttps://github.com/viniciuspereiras/CVE-2022-22965-pocPOC Details
16Created after the release of CVE-2022-22965 and CVE-2022-22963. Bash script that detects Spring Framework occurrences in your projects and systems, allowing you to get insight on versions used. Unpacks JARs and analyzes their Manifest files.https://github.com/mebibite/springhoundPOC Details
17CVE-2022-22965 EXPhttps://github.com/likewhite/CVE-2022-22965POC Details
18SpringFramework 远程代码执行漏洞CVE-2022-22965https://github.com/Axx8/SpringFramework_CVE-2022-22965_RCEPOC Details
19Showcase of overridding the Spring Framework version in older Spring Boot versionshttps://github.com/snicoll-scratches/spring-boot-cve-2022-22965POC Details
20Spring-0day/CVE-2022-22965https://github.com/nu0l/CVE-2022-22965POC Details
21批量无损检测CVE-2022-22965https://github.com/tangxiaofeng7/CVE-2022-22965-Spring-Core-RcePOC Details
22CVE-2022-22965 spring-core批量检测脚本https://github.com/whoami0622/CVE-2022-22965-POCPOC Details
23Nonehttps://github.com/helsecert/CVE-2022-22965POC Details
24Nonehttps://github.com/lcarea/CVE-2022-22965POC Details
25CVE-2022-22965 Environmenthttps://github.com/Joe1sn/CVE-2022-22965POC Details
26Spring4Shell (CVE-2022-22965)https://github.com/zer0yu/CVE-2022-22965POC Details
27Spring Framework RCE via Data Binding on JDK 9+ / spring4shell / CVE-2022-22965https://github.com/me2nuk/CVE-2022-22965POC Details
28CVE-2022-22965https://github.com/wshon/spring-framework-rcePOC Details
29CVE-2022-22965 POChttps://github.com/Wrin9/CVE-2022-22965POC Details
30CVE-2022-22965\Spring-Core-RCE堪比关于 Apache Log4j2核弹级别漏洞exp的rce一键利用https://github.com/wjl110/CVE-2022-22965_Spring_Core_RCEPOC Details
31Nonehttps://github.com/mwojterski/cve-2022-22965POC Details
32Nmap Spring4Shell NSE script for Spring Boot RCE (CVE-2022-22965) https://github.com/gpiechnik2/nmap-spring4shellPOC Details
33Docker PoC for CVE-2022-22965 with Spring Boot version 2.6.5https://github.com/itsecurityco/CVE-2022-22965POC Details
34PowerShell port of CVE-2022-22965 vulnerability check by colincowie.https://github.com/daniel0x00/Invoke-CVE-2022-22965-SafeCheckPOC Details
35Intentionally vulnerable Spring app to test CVE-2022-22965https://github.com/fracturelabs/spring4shell_victimPOC Details
36CVE-2022-22965 (Spring4Shell) Proof of Concepthttps://github.com/sunnyvale-it/CVE-2022-22965-PoCPOC Details
37Spring4Shell - CVE-2022-22965https://github.com/twseptian/cve-2022-22965POC Details
38Another spring4shell (Spring core RCE) POChttps://github.com/netcode/Spring4shell-CVE-2022-22965-POCPOC Details
39Vulnerability scanner for Spring4Shell (CVE-2022-22965)https://github.com/fracturelabs/go-scan-springPOC Details
40Spring has Confirmed the RCE in Spring Framework. The team has just published the statement along with the mitigation guides for the issue. Now, this vulnerability can be tracked as CVE-2022-22965.https://github.com/Snip3R69/spring-shell-vulnPOC Details
41Spring4Shell is a critical RCE vulnerability in the Java Spring Framework and is one of three related vulnerabilities published on March 30https://github.com/0xr1l3s/CVE-2022-22965POC Details
42Spring Framework RCE Exploithttps://github.com/luoqianlin/CVE-2022-22965POC Details
43Exploit Of Spring4Shell!https://github.com/0xrobiul/CVE-2022-22965POC Details
44A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.https://github.com/LudovicPatho/CVE-2022-22965_Spring4ShellPOC Details
45Nonehttps://github.com/irgoncalves/irule-cve-2022-22965POC Details
46The demo code showing the recent Spring4Shell RCE (CVE-2022-22965)https://github.com/datawiza-inc/spring-rec-demoPOC Details
47Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)https://github.com/alt3kx/CVE-2022-22965POC Details
48CVE-2022-22965 pocsuite3 POChttps://github.com/wikiZ/springboot_CVE-2022-22965POC Details
49CVE-2022-22965写入冰蝎webshell脚本https://github.com/4nth0ny1130/spring4shell_behinderPOC Details
50Spring4Shell PoC (CVE-2022-22965)https://github.com/t3amj3ff/Spring4ShellPoCPOC Details
51Nonehttps://github.com/CalumHutton/CVE-2022-22965-PoC_PayaraPOC Details
52Nonehttps://github.com/fransvanbuul/CVE-2022-22965-susceptibilityPOC Details
53Script to check for Spring4Shell vulnerabilityhttps://github.com/jrgdiaz/Spring4Shell-CVE-2022-22965.pyPOC Details
54Spring4Shell , Spring Framework RCE (CVE-2022-22965) , Burpsuite Pluginhttps://github.com/Loneyers/Spring4ShellPOC Details
55spring4shell | CVE-2022-22965https://github.com/p1ckzi/CVE-2022-22965POC Details
56exploitation script tryhackme https://github.com/Omaraitbenhaddi/-Spring4Shell-CVE-2022-22965-POC Details
57Nonehttps://github.com/c4mx/CVE-2022-22965_PoCPOC Details
58Nonehttps://github.com/mariomamo/CVE-2022-22965POC Details
59Nonehttps://github.com/khidottrivi/CVE-2022-22965POC Details
60Nonehttps://github.com/Enokiy/spring-RCE-CVE-2022-22965POC Details
61CVE-2022-22965 Spring4Shell research & PoChttps://github.com/cxzero/CVE-2022-22965-spring4shellPOC Details
62burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977https://github.com/tpt11fb/SpringVulScanPOC Details
63EXP for Spring4Shell(CVE-2022-22965)https://github.com/D1mang/Spring4Shell-CVE-2022-22965POC Details
64CVE-2022-22965图形化检测工具https://github.com/iloveflag/Fast-CVE-2022-22965POC Details
65Nonehttps://github.com/ClemExp/CVE-2022-22965-PoCPOC Details
66CVE-2022-22965 proof of concepthttps://github.com/clemoregan/SSE4-CVE-2022-22965POC Details
67Nonehttps://github.com/devengpk/CVE-2022-22965POC Details
68CVE-2022-22965\Spring-Core-RCE核弹级别漏洞的rce图形化GUI一键利用工具,基于JavaFx开发,图形化操作更简单,提高效率。https://github.com/zangcc/CVE-2022-22965-rexbbPOC Details
69User friendly Spring4Shell POChttps://github.com/ajith737/Spring4Shell-CVE-2022-22965-POCPOC Details
70 🚀 Exploit for Spring core RCE in C [ wip ]https://github.com/c33dd/CVE-2022-22965POC Details
71Demonstrable Proof of Concept Exploit for Spring4Shell Vulnerability (CVE-2022-22965)https://github.com/gokul-ramesh/Spring4Shell-PoC-exploitPOC Details
72A simple python script for a firewall rule that blocks incoming requests based on the Spring4Shell (CVE-2022-22965) vulnerabilityhttps://github.com/bL34cHig0/Telstra-Cybersecurity-Virtual-Experience-POC Details
73Poc&Exp,支持批量扫描,反弹shellhttps://github.com/BKLockly/CVE-2022-22965POC Details
74Spring rce environment for CVE-2022-22965https://github.com/dbgee/Spring4ShellPOC Details
75PoC and exploit for CVE-2022-22965 Spring4Shellhttps://github.com/jakabakos/CVE-2022-22965-Spring4ShellPOC Details
76A quick python script that automates the exploitation of the second deadliest Java based vulnerability CVE-2022-22965.https://github.com/h4ck0rman/Spring4Shell-PoCPOC Details
77Nonehttps://github.com/sohamsharma966/Spring4Shell-CVE-2022-22965POC Details
78Spring4Shell Vulnerability RCE - CVE-2022-22965 https://github.com/LucasPDiniz/CVE-2022-22965POC Details
79Nonehttps://github.com/xsxtw/SpringFramework_CVE-2022-22965_RCEPOC Details
80Script to check for Spring4Shell vulnerabilityhttps://github.com/te5t321/Spring4Shell-CVE-2022-22965.pyPOC Details
81Nonehttps://github.com/guigui237/Expoitation-de-la-vuln-rabilit-CVE-2022-22965POC Details
82POC firewall with rules designed to detect and block Spring4Shell vulnerability (CVE-2022-22965) exploithttps://github.com/BlackBird63030/Block-Spring4ShellPOC Details
83POC firewall with rules designed to detect and block Spring4Shell vulnerability (CVE-2022-22965) exploithttps://github.com/SkyM1raj/Block-Spring4ShellPOC Details
84POC firewall with rules designed to detect and block Spring4Shell vulnerability (CVE-2022-22965) exploithttps://github.com/Aur3ns/Block-Spring4ShellPOC Details
85In this challenge, I analyzed the Spring4Shell (CVE-2022-22965) vulnerability, investigated security bypasses, and wrote an Incident Postmortem Report detailing the detection, impact, and resolution of the attack. I also implemented a firewall rule in Python to block malicious requests and prevent future exploitation.https://github.com/jashan-lefty/Spring4ShellPOC Details
86spring-core单个图形化利用工具,CVE-2022-22965及修复方案已出https://github.com/Bouquets-ai/CVE-2022-22965-GUItoolsPOC Details
87Spring MVC and Spring WebFlux applications running on Java Development Kit 9+ are susceptible to remote code execution via data binding. It requires the application to run on Tomcat as a WAR deployment. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-22965.yamlPOC Details
88A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. https://github.com/projectdiscovery/nuclei-templates/blob/main/dast/cves/2022/CVE-2022-22965.yamlPOC Details
89Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Spring%20Data%20Binding%E4%B8%8EJDK%209%2B%E5%AF%BC%E8%87%B4%E7%9A%84%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2022-22965.mdPOC Details
90https://github.com/vulhub/vulhub/blob/master/spring/CVE-2022-22965/README.mdPOC Details
91Firewall rules to mitigate a zero-day vulnerability malware attack (CVE-2022-22965), known as Spring4Shellhttps://github.com/ESSAFAR/Firewall-RulesPOC Details
92SpringFramework 远程代码执行漏洞CVE-2022-22965https://github.com/SecNN/SpringFramework_CVE-2022-22965_RCEPOC Details
93Hands-on lab on detecting and mitigating web app threats using OWASP ZAP, Burp Suite, and ModSecurity WAF (with OWASP CRS). Case study: Spring4Shell (CVE-2022-22965). Local Docker-based setup.https://github.com/brunoh6/web-threat-mitigationPOC Details
94(CVE-2022-22965)PoC 应用程序和漏洞利用https://github.com/ZapcoMan/spring4shell-vulnerable-applicationPOC Details
95Spring4Shell (POC)https://github.com/osungjinwoo/CVE-2022-22965POC Details
96Python-based simulated firewall to detect and block Spring4Shell (CVE-2022-22965) exploit attempts. This project filters HTTP requests by identifying malicious payload patterns using a custom firewall_server.py and tests them with test_requests.py.https://github.com/Nosie12/fire-wall-serverPOC Details
97🔒 Spring4Shell Firewall Defense — Cybersecurity Incident Simulation This project is part of a Cybersecurity Job Simulation I completed in August 2025 through Forage. It focuses on detecting, analyzing, and mitigating a simulated real-world cyberattack involving the Spring4Shell (CVE-2022-22965) vulnerability https://github.com/salo-404/firewallPOC Details
98Nonehttps://github.com/shoucheng3/spring-projects__spring-framework_CVE-2022-22965_5-2-19-RELEASEPOC Details
99Cybersecurity simulation showcasing SOC analyst skills in malware triage, incident response, and vulnerability management (Spring4Shell CVE-2022-22965).https://github.com/Toph404/telstra-cyber-analyst-job-simulationPOC Details
100Proof-of-Concept (POC) of a simple firewall in Python designed to mitigate the Spring4Shell (CVE-2022-22965) RCE attack by inspecting and blocking malicious request bodies.https://github.com/NickoPS87/Spring4Shell-Python-Firewall-POCPOC Details
101CVE-2022-22965 proof of concept for CS4239 report https://github.com/xenosf/CS4239-Spring4Shell-POCPOC Details
102Fully automated Spring4Shell (CVE-2022-22965) + GitLab RCE frameworkhttps://github.com/mylo-2001/GhostStrikePOC Details
103A Remote Code Execution exploit targeting Spring Framework vulnerability CVE-2022-22965 💀https://github.com/Hghost0x00/CVE-2022-22965POC Details
104Nonehttps://github.com/dbwlsdnr95/CVE-2022-22965-spring4shellPOC Details
105Nonehttps://github.com/nhattanhh/CVE-2022-22965POC Details
106CVE-2022-22965 - Spring4Shellhttps://github.com/Anon2Fear/CVE-2022-22965POC Details
107A comprehensive Security Operations Centre (SOC) incident response simulation demonstrating threat detection, triage, analysis, and mitigation of the Spring4Shell vulnerability (CVE-2022-22965).https://github.com/Shakur1314/CVE-2022-22965-Spring4Shell-Security-Operations-AnalysisPOC Details
108Nonehttps://github.com/dbwlsdnr95/CVE-2022-22965POC Details
109Spring4Shell (CVE-2022-22965) DFIR lab with exploit simulation, Python WAF, IOC-based detection, and PCAP analysis.https://github.com/suyash-R-K/dfir-malware-investigationPOC Details
110Nonehttps://github.com/aditidutta696-dev/Spring4Shell-CVE-2022-22965-Exploitation-AttemptPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-22965

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-04-01 · 32 CVEs total

CVE-2022-250179.1 CRITICALHitron Technologies CHITA Router Firmware 操作系统命令注入漏洞
CVE-2022-212358.1 HIGHCommand Injection
CVE-2022-244408.1 HIGHCommand Injection
CVE-2022-212238.1 HIGHCommand Injection
CVE-2022-240668.1 HIGHCommand Injection
CVE-2022-22950Vmware Spring Framework 安全漏洞
CVE-2021-20238Red Hat OpenShift Container Platform 访问控制错误漏洞
CVE-2021-32503SICK FieldEcho 资源管理错误漏洞
CVE-2021-3461Red Hat Keycloak代码问题漏洞
CVE-2021-20295Red Hat Enterprise Linux 缓冲区错误漏洞
CVE-2021-27223Kaspersky Anti-Virus安全漏洞
CVE-2022-27534Kaspersky Anti-Virus 安全漏洞
CVE-2022-25155Mitsubishi Electric MELSEC iQ-F series 授权问题漏洞
CVE-2022-25156Mitsubishi Electric MELSEC iQ-F series 加密问题漏洞
CVE-2022-25157Mitsubishi Electric MELSEC iQ-F series 授权问题漏洞
CVE-2022-25159Mitsubishi Electric MELSEC iQ-F series 安全漏洞
CVE-2022-25158Mitsubishi Electric MELSEC iQ-F series 安全漏洞
CVE-2022-25160Mitsubishi Electric Factory Automation 安全漏洞
CVE-2021-3847Linux kernel 安全漏洞
CVE-2019-14839Business-central 信息泄露漏洞

Showing top 20 of 32 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-22965

No comments yet


Leave a comment