Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-22947 PoC — VMware Spring Cloud Gateway 代码注入漏洞

Source
Associated Vulnerability
Title:VMware Spring Cloud Gateway 代码注入漏洞 (CVE-2022-22947)
Description:In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.
Description
Spring Cloud Gateway Actuator API SpEL Code Injection.
Readme
# CVE-2022-22947
<p align="center">
  <img src="https://user-images.githubusercontent.com/44043159/156822561-fc6481e7-ee08-4672-8fbf-a66b0db89333.jpg" width="200" height="200">
</p>

    >> script for exploit Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)
    
---
<p align="center">
  <img src="https://user-images.githubusercontent.com/44043159/156822794-f5699d3e-b78a-4ce0-962e-c86c57364f08.png">
</p>

---

```bash
https://github.com/march0s1as/CVE-2022-22947
cd CVE-2022-22947
go build spring.go
./spring -h
```


File Snapshot

[4.0K] /data/pocs/cb9bf6d6ead4cf692b46eede6fe98db050241108 ├── [ 543] README.md └── [3.9K] spring.go 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →