Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-22947 PoC — VMware Spring Cloud Gateway 代码注入漏洞

Source
Associated Vulnerability
Title:VMware Spring Cloud Gateway 代码注入漏洞 (CVE-2022-22947)
Description:In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.
Description
Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)
Readme
# Spring Cloud Gateway Actuator API SpEL表达式注入命令执行(CVE-2022-22947)
Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)


   **使用方法:**

      -t http://vuldomain.com             //单个IP
  
      -f urls.txt                         //读取文件批量扫描,采用多线程,速度快
  
      -c command                          //自定义命令,默认是whoami

![img](https://github.com/mrknow001/CVE-2022-22947/blob/main/img/spring-t.png)

![img](https://github.com/mrknow001/CVE-2022-22947/blob/main/img/spring-c.png)

![img](https://github.com/mrknow001/CVE-2022-22947/blob/main/img/spring-f.png)
File Snapshot

[4.0K] /data/pocs/a831cffbdbb5a37daa4bbee4415be9f2751af45b ├── [4.0K] img │   ├── [ 81K] spring-c.png │   ├── [370K] spring-f.png │   └── [ 73K] spring-t.png ├── [ 659] README.md └── [5.3K] spring-cloud-gateway-CVE-2022-22947.py 1 directory, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →