Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-27518 PoC — Unauthenticated remote arbitrary code execution

Source
Associated Vulnerability
Title:Unauthenticated remote arbitrary code execution (CVE-2022-27518)
Description:Unauthenticated remote arbitrary code execution
Description
A POC on how to exploit CVE-2022-27518 
Readme
# CVE-2022-27518_POC

```bash
docker pull quay.io/citrix/citrix-k8s-cpx-ingress:13.0-58.30
```
Use the following command to verify if CPX image is installed in docker images
```bash
docker images | grep 'citrix-k8s-cpx-ingress'
```
Use the following command to create a CPX container instance running in bridge mode
```bash
docker run --rm -dt -P --privileged=true -e EULA=yes --ulimit core=-1 --name cpx-hello-world quay.io/citrix/citrix-k8s-cpx-ingress:13.0-58.30 
```
Once CPX container is deployed successfully, the following command can be used to access the Shell of CPX container
```bash
docker exec -it cpx-hello-world bash
```
File Snapshot

[4.0K] /data/pocs/169f6ef9a2cbeb34b2199b10d7ea97c19b0c6273 └── [ 635] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →