Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-22947 PoC — VMware Spring Cloud Gateway 代码注入漏洞

Source
Associated Vulnerability
Title:VMware Spring Cloud Gateway 代码注入漏洞 (CVE-2022-22947)
Description:In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.
Description
Spring Cloud Gateway Actuator API SpEL表达式注入命令执行(CVE-2022-22947)批量检测工具
Readme
# SpEL
Spring Cloud Gateway Actuator API SpEL表达式注入命令执行(CVE-2022-22947)批量检测工具
## 使用方法
文件中逐行写入需要检测的URL,参数-TF 指定文件 -t 并发数量
## 执行效果
![image](https://user-images.githubusercontent.com/41934714/157003376-4a4c7c88-3b26-4e30-95d4-0778dbb83c20.png)
#### 玉兔安全致力于web安全、红蓝对抗、内网渗透、免杀技巧、安全工具系列干货分享。更多安全工具分享,欢迎关注玉兔安全公众号!
![image](https://user-images.githubusercontent.com/41934714/157003667-2745fd4b-950f-4b1f-8c9f-28b30e46c9b3.png)
File Snapshot

[4.0K] /data/pocs/3281af04021917183549b0195e06aa4a654cb8f6 ├── [ 37] go.mod ├── [ 86] main.go ├── [4.0K] Other │   ├── [ 976] flag.go │   ├── [ 358] Readfile.go │   ├── [1.9K] Request.go │   └── [ 550] Scan.go ├── [ 628] README.md └── [ 133] url.txt 1 directory, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →