Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-22963 PoC — Spring Framework 代码注入漏洞

Source
Associated Vulnerability
Title:Spring Framework 代码注入漏洞 (CVE-2022-22963)
Description:In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
Description
CVE-2022-22963 research
Readme
# SpringCloudFunction-Research
CVE-2022-22963 research

# 環境
* vulfocus/spring-cloud-function-rce:latest

# 成因
* Request Header 中 `spring.cloud.function.routing-expression` 參數解析問題,造成注入Payload攻擊。

# Reference
* https://hosch3n.github.io/2022/03/26/SpringCloudFunction%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/
* https://www.kitploit.com/2022/03/spring-spel-0day-poc-spring-cloud.html
* [spring-cloud-function](https://github.com/spring-cloud/spring-cloud-function)
File Snapshot

[4.0K] /data/pocs/028efb812420cc1b696023834b2a49ff283eab94 ├── [ 19M] app.jar ├── [ 256] poc.py └── [ 497] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →