Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | VMware Workspace ONE Access and Identity Manager | Access 21.08.0.1, 21.08.0.0, 20.10.0.1, 20.10.0.0. Identity Manager 3.3.6, 3.3.5, 3.3.4, 3.3.3. | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | 提供单个或批量URL扫描是否存在CVE-2022-22954功能 | https://github.com/axingde/CVE-2022-22954-POC | POC Details |
| 2 | POC for VMWARE CVE-2022-22954 | https://github.com/sherlocksecurity/VMware-CVE-2022-22954 | POC Details |
| 3 | CVE-2022-22954 is a server-side template injection vulnerability in the VMware Workspace ONE Access and Identity Manager | https://github.com/Vulnmachines/VMWare_CVE-2022-22954 | POC Details |
| 4 | None | https://github.com/aniqfakhrul/CVE-2022-22954 | POC Details |
| 5 | 提供批量扫描URL以及执行命令功能。Workspace ONE Access 模板注入漏洞,可执行任意代码 | https://github.com/jax7sec/CVE-2022-22954 | POC Details |
| 6 | CVE-2022-22954-VMware-RCE批量检测POC | https://github.com/bb33bb/CVE-2022-22954-VMware-RCE | POC Details |
| 7 | None | https://github.com/lucksec/VMware-CVE-2022-22954 | POC Details |
| 8 | None | https://github.com/mumu2020629/-CVE-2022-22954-scanner | POC Details |
| 9 | CVE-2022-22954 Açığı test etme | https://github.com/MSeymenD/CVE-2022-22954-Testi | POC Details |
| 10 | None | https://github.com/corelight/cve-2022-22954 | POC Details |
| 11 | PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection | https://github.com/DrorDvash/CVE-2022-22954_VMware_PoC | POC Details |
| 12 | VMware Workspace ONE Access远程代码执行漏洞 / Code By:Jun_sheng | https://github.com/Jun-5heng/CVE-2022-22954 | POC Details |
| 13 | VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual. | https://github.com/tunelko/CVE-2022-22954-PoC | POC Details |
| 14 | CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入 | https://github.com/bewhale/CVE-2022-22954 | POC Details |
| 15 | Proof of Concept for exploiting VMware CVE-2022-22954 | https://github.com/tyleraharrison/VMware-CVE-2022-22954-Command-Injector | POC Details |
| 16 | CVE-2022-22954 VMware Workspace ONE Access free marker SSTI | https://github.com/MLX15/CVE-2022-22954 | POC Details |
| 17 | None | https://github.com/mhurts/CVE-2022-22954-POC | POC Details |
| 18 | CVE-2022-22954 analyst | https://github.com/nguyenv1nK/CVE-2022-22954 | POC Details |
| 19 | Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960 | https://github.com/Chocapikk/CVE-2022-22954 | POC Details |
| 20 | Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960 | https://github.com/secfb/CVE-2022-22954 | POC Details |
| 21 | None | https://github.com/orwagodfather/CVE-2022-22954 | POC Details |
| 22 | VMware Workspace ONE Access and Identity Manager RCE via SSTI. CVE-2022-22954 - PoC SSTI * exploit+payload+shodan (ну набором) | https://github.com/b4dboy17/CVE-2022-22954 | POC Details |
| 23 | Practising technical writing with researching CVE-2022-22954 VMware Workspace ONE Access RCE vulnerability. | https://github.com/arzuozkan/CVE-2022-22954 | POC Details |
| 24 | I'm trying | https://github.com/1SeaMy/CVE-2022-22954 | POC Details |
| 25 | None | https://github.com/amit-pathak009/CVE-2022-22954 | POC Details |
| 26 | None | https://github.com/amit-pathak009/CVE-2022-22954-PoC | POC Details |
| 27 | 一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接 | https://github.com/Schira4396/VcenterKiller | POC Details |
| 28 | None | https://github.com/lolminerxmrig/CVE-2022-22954_ | POC Details |
| 29 | None | https://github.com/Jhonsonwannaa/CVE-2022-22954 | POC Details |
| 30 | Proof of Concept for exploiting VMware CVE-2022-22954 | https://github.com/emilyastranova/VMware-CVE-2022-22954-Command-Injector | POC Details |
| 31 | VMware Workspace ONE Access is susceptible to a remote code execution vulnerability due to a server-side template injection flaw. An unauthenticated attacker with network access could exploit this vulnerability by sending a specially crafted request to a vulnerable VMware Workspace ONE or Identity Manager. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-22954.yaml | POC Details |
| 32 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/VMware%20Workspace%20ONE%20Access%20SSTI%E6%BC%8F%E6%B4%9E%20CVE-2022-22954.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet