Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-22963 PoC — Spring Framework 代码注入漏洞

Source
Associated Vulnerability
Title:Spring Framework 代码注入漏洞 (CVE-2022-22963)
Description:In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
Readme
# CVE-2022-22963-Reverse-Shell-Exploit
This is a Python script that exploits CVE-2022-22963, a remote code execution vulnerability in Spring Cloud Function that allows attackers to execute arbitrary code on a vulnerable server. The exploit uses the vulnerable /functionRouter endpoint to execute a command on the target server.
## Usage
Install the required Python libraries by running the following command:
```python
pip3 install requests

chmod +x spring_exploit.py

Run the script by providing the target URL using the -u or --url option:
./spring_exploit.py -u http://mysite.com:8080
or 
 python spring_exploit.py -u http://mysite.com:8080
File Snapshot

[4.0K] /data/pocs/3dd201634ecbe3b41918a8bd5e999b246e1e6b22 ├── [ 645] README.md └── [2.5K] spring_exploit.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →