An exploit for the CVE-2022-22963 (Spring Cloud Function Vulnerability)# Exploit-for-CVE-2022-22963
Exploit using curl to get a reverse shell in vulnerable spring cloud environments.
This exploit abuses the functionRouter URI, by injecting code into the `eval` function of the Spring Framework through a post request with a header that gives us Remote Code Execution (RCE).
<p align="center">
<img src="images/2023-06-29_01-30.png" width="650" title="Terminal print">
</p>
### Created by
[Henri Vlasic](https://github.com/HenriVlasic)
- [Linkedin](https://www.linkedin.com/in/henri-vlasic/)
[Arthur Valverde](https://github.com/arthurvmbl)
- [Linkedin](https://www.linkedin.com/in/uartuo/)
[4.0K] /data/pocs/156bacdffcc4c71a2a61cd7681d1bae449db91ee
├── [4.0K] images
│ └── [577K] 2023-06-29_01-30.png
├── [ 628] README.md
└── [1.1K] spring-injection.sh
1 directory, 3 files