支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:640

64.0%
一、 漏洞 CVE-2022-22965 基础信息
漏洞信息
                                        # N/A

## 漏洞概述
Spring MVC 或 Spring WebFlux 应用程序在 JDK 9 及以上版本可能存在远程代码执行 (RCE) 导致的数据绑定漏洞。

## 影响版本
- JDK 9 及以上版本
- 使用 Tomcat 作为 WAR 部署的 Spring 应用程序

## 细节
- 漏洞利用要求应用程序在 Tomcat 上作为 WAR 包部署。
- 如果应用程序作为 Spring Boot 可执行 jar 部署,则不受到此漏洞的影响。
- 该漏洞的本质更为通用,可能存在其他途径进行利用。

## 影响
- 可通过数据绑定导致远程代码执行 (RCE) 攻击。
- 主要影响 Tomcat 上的 WAR 部署应用,Spring Boot 可执行 jar 包不受影响。
                                        
神龙判断

是否为 Web 类漏洞:

判断理由:

是。这个漏洞涉及Spring MVC或Spring WebFlux应用程序在JDK 9+环境下,通过数据绑定可能遭受远程代码执行(RCE)的风险。具体来说,当应用程序以WAR的形式部署在Tomcat上时,可能会被利用。虽然默认的Spring Boot可执行jar部署方式不受此漏洞影响,但该漏洞的本质较为普遍,可能存在其他利用途径。
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
N/A
来源:美国国家漏洞数据库 NVD
漏洞描述信息
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
对生成代码的控制不恰当(代码注入)
来源:美国国家漏洞数据库 NVD
漏洞标题
Spring Framework 代码注入漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Spring Framework是美国Spring团队的一套开源的Java、JavaEE应用程序框架。该框架可帮助开发人员构建高质量的应用。 Spring Framework 存在代码注入漏洞,该漏洞源于 JDK 9+ 上的数据绑定的 RCE。以下产品和版本受到影响:5.3.0 至 5.3.17、5.2.0 至 5.2.19、较旧的和不受支持的版本也会受到影响。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
代码注入
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2022-22965 的公开POC
#POC 描述源链接神龙链接
1Spring4Shell Proof Of Concept/And vulnerable application CVE-2022-22965https://github.com/BobTheShoplifter/Spring4Shell-POCPOC详情
2CVE-2022-22965 : about spring core rcehttps://github.com/Mr-xn/spring-core-rcePOC详情
3Spring4Shell - Spring Core RCE - CVE-2022-22965https://github.com/TheGejr/SpringShellPOC详情
4Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploithttps://github.com/reznok/Spring4Shell-POCPOC详情
5spring-core单个图形化利用工具,CVE-2022-22965及修复方案已出https://github.com/light-Life/CVE-2022-22965-GUItoolsPOC详情
6CVE-2022-22965 - CVE-2010-1622 reduxhttps://github.com/DDuarte/springshell-rce-pocPOC详情
7spring框架RCE漏洞 CVE-2022-22965https://github.com/k3rwin/spring-core-rcePOC详情
8springFramework_CVE-2022-22965_RCE简单利用https://github.com/liangyueliangyue/spring-core-rcePOC详情
9Nonehttps://github.com/Kirill89/CVE-2022-22965-PoCPOC详情
10Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.https://github.com/FourCoreLabs/spring4shell-exploit-pocPOC详情
11Spring Framework RCE (Quick pentest notes)https://github.com/alt3kx/CVE-2022-22965_PoCPOC详情
12Vulnerabilidad RCE en Spring Framework vía Data Binding on JDK 9+ (CVE-2022-22965 aka "Spring4Shell")https://github.com/GuayoyoCyber/CVE-2022-22965POC详情
13A Safer PoC for CVE-2022-22965 (Spring4Shell)https://github.com/colincowie/Safer_PoC_CVE-2022-22965POC详情
14Nonehttps://github.com/rwincey/spring4shell-CVE-2022-22965POC详情
15CVE-2022-22965 poc including reverse-shell supporthttps://github.com/viniciuspereiras/CVE-2022-22965-pocPOC详情
16Created after the release of CVE-2022-22965 and CVE-2022-22963. Bash script that detects Spring Framework occurrences in your projects and systems, allowing you to get insight on versions used. Unpacks JARs and analyzes their Manifest files.https://github.com/mebibite/springhoundPOC详情
17CVE-2022-22965 EXPhttps://github.com/likewhite/CVE-2022-22965POC详情
18SpringFramework 远程代码执行漏洞CVE-2022-22965https://github.com/Axx8/SpringFramework_CVE-2022-22965_RCEPOC详情
19Showcase of overridding the Spring Framework version in older Spring Boot versionshttps://github.com/snicoll-scratches/spring-boot-cve-2022-22965POC详情
20Spring-0day/CVE-2022-22965https://github.com/nu0l/CVE-2022-22965POC详情
21批量无损检测CVE-2022-22965https://github.com/tangxiaofeng7/CVE-2022-22965-Spring-Core-RcePOC详情
22CVE-2022-22965 spring-core批量检测脚本https://github.com/whoami0622/CVE-2022-22965-POCPOC详情
23Nonehttps://github.com/helsecert/CVE-2022-22965POC详情
24Nonehttps://github.com/lcarea/CVE-2022-22965POC详情
25CVE-2022-22965 Environmenthttps://github.com/Joe1sn/CVE-2022-22965POC详情
26Spring4Shell (CVE-2022-22965)https://github.com/zer0yu/CVE-2022-22965POC详情
27Spring Framework RCE via Data Binding on JDK 9+ / spring4shell / CVE-2022-22965https://github.com/me2nuk/CVE-2022-22965POC详情
28CVE-2022-22965https://github.com/wshon/spring-framework-rcePOC详情
29CVE-2022-22965 POChttps://github.com/Wrin9/CVE-2022-22965POC详情
30CVE-2022-22965\Spring-Core-RCE堪比关于 Apache Log4j2核弹级别漏洞exp的rce一键利用https://github.com/wjl110/CVE-2022-22965_Spring_Core_RCEPOC详情
31Nonehttps://github.com/mwojterski/cve-2022-22965POC详情
32Nmap Spring4Shell NSE script for Spring Boot RCE (CVE-2022-22965) https://github.com/gpiechnik2/nmap-spring4shellPOC详情
33Docker PoC for CVE-2022-22965 with Spring Boot version 2.6.5https://github.com/itsecurityco/CVE-2022-22965POC详情
34PowerShell port of CVE-2022-22965 vulnerability check by colincowie.https://github.com/daniel0x00/Invoke-CVE-2022-22965-SafeCheckPOC详情
35Intentionally vulnerable Spring app to test CVE-2022-22965https://github.com/fracturelabs/spring4shell_victimPOC详情
36CVE-2022-22965 (Spring4Shell) Proof of Concepthttps://github.com/sunnyvale-it/CVE-2022-22965-PoCPOC详情
37Spring4Shell - CVE-2022-22965https://github.com/twseptian/cve-2022-22965POC详情
38Another spring4shell (Spring core RCE) POChttps://github.com/netcode/Spring4shell-CVE-2022-22965-POCPOC详情
39Vulnerability scanner for Spring4Shell (CVE-2022-22965)https://github.com/fracturelabs/go-scan-springPOC详情
40Spring has Confirmed the RCE in Spring Framework. The team has just published the statement along with the mitigation guides for the issue. Now, this vulnerability can be tracked as CVE-2022-22965.https://github.com/Snip3R69/spring-shell-vulnPOC详情
41Spring4Shell is a critical RCE vulnerability in the Java Spring Framework and is one of three related vulnerabilities published on March 30https://github.com/0xr1l3s/CVE-2022-22965POC详情
42Spring Framework RCE Exploithttps://github.com/luoqianlin/CVE-2022-22965POC详情
43Exploit Of Spring4Shell!https://github.com/0xrobiul/CVE-2022-22965POC详情
44A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.https://github.com/LudovicPatho/CVE-2022-22965_Spring4ShellPOC详情
45Nonehttps://github.com/irgoncalves/irule-cve-2022-22965POC详情
46The demo code showing the recent Spring4Shell RCE (CVE-2022-22965)https://github.com/datawiza-inc/spring-rec-demoPOC详情
47Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)https://github.com/alt3kx/CVE-2022-22965POC详情
48CVE-2022-22965 pocsuite3 POChttps://github.com/wikiZ/springboot_CVE-2022-22965POC详情
49CVE-2022-22965写入冰蝎webshell脚本https://github.com/4nth0ny1130/spring4shell_behinderPOC详情
50Spring4Shell PoC (CVE-2022-22965)https://github.com/t3amj3ff/Spring4ShellPoCPOC详情
51Nonehttps://github.com/CalumHutton/CVE-2022-22965-PoC_PayaraPOC详情
52Nonehttps://github.com/fransvanbuul/CVE-2022-22965-susceptibilityPOC详情
53Script to check for Spring4Shell vulnerabilityhttps://github.com/jrgdiaz/Spring4Shell-CVE-2022-22965.pyPOC详情
54Spring4Shell , Spring Framework RCE (CVE-2022-22965) , Burpsuite Pluginhttps://github.com/Loneyers/Spring4ShellPOC详情
55spring4shell | CVE-2022-22965https://github.com/p1ckzi/CVE-2022-22965POC详情
56exploitation script tryhackme https://github.com/Omaraitbenhaddi/-Spring4Shell-CVE-2022-22965-POC详情
57Nonehttps://github.com/c4mx/CVE-2022-22965_PoCPOC详情
58Nonehttps://github.com/mariomamo/CVE-2022-22965POC详情
59Nonehttps://github.com/khidottrivi/CVE-2022-22965POC详情
60Nonehttps://github.com/Enokiy/spring-RCE-CVE-2022-22965POC详情
61CVE-2022-22965 Spring4Shell research & PoChttps://github.com/cxzero/CVE-2022-22965-spring4shellPOC详情
62burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977https://github.com/tpt11fb/SpringVulScanPOC详情
63EXP for Spring4Shell(CVE-2022-22965)https://github.com/D1mang/Spring4Shell-CVE-2022-22965POC详情
64CVE-2022-22965图形化检测工具https://github.com/iloveflag/Fast-CVE-2022-22965POC详情
65Nonehttps://github.com/ClemExp/CVE-2022-22965-PoCPOC详情
66CVE-2022-22965 proof of concepthttps://github.com/clemoregan/SSE4-CVE-2022-22965POC详情
67Nonehttps://github.com/devengpk/CVE-2022-22965POC详情
68CVE-2022-22965\Spring-Core-RCE核弹级别漏洞的rce图形化GUI一键利用工具,基于JavaFx开发,图形化操作更简单,提高效率。https://github.com/zangcc/CVE-2022-22965-rexbbPOC详情
69User friendly Spring4Shell POChttps://github.com/ajith737/Spring4Shell-CVE-2022-22965-POCPOC详情
70 🚀 Exploit for Spring core RCE in C [ wip ]https://github.com/c33dd/CVE-2022-22965POC详情
71Demonstrable Proof of Concept Exploit for Spring4Shell Vulnerability (CVE-2022-22965)https://github.com/gokul-ramesh/Spring4Shell-PoC-exploitPOC详情
72A simple python script for a firewall rule that blocks incoming requests based on the Spring4Shell (CVE-2022-22965) vulnerabilityhttps://github.com/bL34cHig0/Telstra-Cybersecurity-Virtual-Experience-POC详情
73Poc&Exp,支持批量扫描,反弹shellhttps://github.com/BKLockly/CVE-2022-22965POC详情
74Spring rce environment for CVE-2022-22965https://github.com/dbgee/Spring4ShellPOC详情
75PoC and exploit for CVE-2022-22965 Spring4Shellhttps://github.com/jakabakos/CVE-2022-22965-Spring4ShellPOC详情
76A quick python script that automates the exploitation of the second deadliest Java based vulnerability CVE-2022-22965.https://github.com/h4ck0rman/Spring4Shell-PoCPOC详情
77Nonehttps://github.com/sohamsharma966/Spring4Shell-CVE-2022-22965POC详情
78Spring4Shell Vulnerability RCE - CVE-2022-22965 https://github.com/LucasPDiniz/CVE-2022-22965POC详情
79Nonehttps://github.com/xsxtw/SpringFramework_CVE-2022-22965_RCEPOC详情
80Script to check for Spring4Shell vulnerabilityhttps://github.com/te5t321/Spring4Shell-CVE-2022-22965.pyPOC详情
81Nonehttps://github.com/guigui237/Expoitation-de-la-vuln-rabilit-CVE-2022-22965POC详情
82POC firewall with rules designed to detect and block Spring4Shell vulnerability (CVE-2022-22965) exploithttps://github.com/BlackBird63030/Block-Spring4ShellPOC详情
83POC firewall with rules designed to detect and block Spring4Shell vulnerability (CVE-2022-22965) exploithttps://github.com/SkyM1raj/Block-Spring4ShellPOC详情
84POC firewall with rules designed to detect and block Spring4Shell vulnerability (CVE-2022-22965) exploithttps://github.com/Aur3ns/Block-Spring4ShellPOC详情
85In this challenge, I analyzed the Spring4Shell (CVE-2022-22965) vulnerability, investigated security bypasses, and wrote an Incident Postmortem Report detailing the detection, impact, and resolution of the attack. I also implemented a firewall rule in Python to block malicious requests and prevent future exploitation.https://github.com/jashan-lefty/Spring4ShellPOC详情
86spring-core单个图形化利用工具,CVE-2022-22965及修复方案已出https://github.com/Bouquets-ai/CVE-2022-22965-GUItoolsPOC详情
87Spring MVC and Spring WebFlux applications running on Java Development Kit 9+ are susceptible to remote code execution via data binding. It requires the application to run on Tomcat as a WAR deployment. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-22965.yamlPOC详情
88A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. https://github.com/projectdiscovery/nuclei-templates/blob/main/dast/cves/2022/CVE-2022-22965.yamlPOC详情
89Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Spring%20Data%20Binding%E4%B8%8EJDK%209%2B%E5%AF%BC%E8%87%B4%E7%9A%84%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2022-22965.mdPOC详情
90https://github.com/vulhub/vulhub/blob/master/spring/CVE-2022-22965/README.mdPOC详情
91Firewall rules to mitigate a zero-day vulnerability malware attack (CVE-2022-22965), known as Spring4Shellhttps://github.com/ESSAFAR/Firewall-RulesPOC详情
92SpringFramework 远程代码执行漏洞CVE-2022-22965https://github.com/SecNN/SpringFramework_CVE-2022-22965_RCEPOC详情
93Hands-on lab on detecting and mitigating web app threats using OWASP ZAP, Burp Suite, and ModSecurity WAF (with OWASP CRS). Case study: Spring4Shell (CVE-2022-22965). Local Docker-based setup.https://github.com/brunoh6/web-threat-mitigationPOC详情
94(CVE-2022-22965)PoC 应用程序和漏洞利用https://github.com/ZapcoMan/spring4shell-vulnerable-applicationPOC详情
95Spring4Shell (POC)https://github.com/osungjinwoo/CVE-2022-22965POC详情
96Python-based simulated firewall to detect and block Spring4Shell (CVE-2022-22965) exploit attempts. This project filters HTTP requests by identifying malicious payload patterns using a custom firewall_server.py and tests them with test_requests.py.https://github.com/Nosie12/fire-wall-serverPOC详情
97🔒 Spring4Shell Firewall Defense — Cybersecurity Incident Simulation This project is part of a Cybersecurity Job Simulation I completed in August 2025 through Forage. It focuses on detecting, analyzing, and mitigating a simulated real-world cyberattack involving the Spring4Shell (CVE-2022-22965) vulnerability https://github.com/salo-404/firewallPOC详情
98Nonehttps://github.com/shoucheng3/spring-projects__spring-framework_CVE-2022-22965_5-2-19-RELEASEPOC详情
99Cybersecurity simulation showcasing SOC analyst skills in malware triage, incident response, and vulnerability management (Spring4Shell CVE-2022-22965).https://github.com/Toph404/telstra-cyber-analyst-job-simulationPOC详情
100Proof-of-Concept (POC) of a simple firewall in Python designed to mitigate the Spring4Shell (CVE-2022-22965) RCE attack by inspecting and blocking malicious request bodies.https://github.com/NickoPS87/Spring4Shell-Python-Firewall-POCPOC详情
101CVE-2022-22965 proof of concept for CS4239 report https://github.com/xenosf/CS4239-Spring4Shell-POCPOC详情
102Fully automated Spring4Shell (CVE-2022-22965) + GitLab RCE frameworkhttps://github.com/mylo-2001/GhostStrikePOC详情
103A Remote Code Execution exploit targeting Spring Framework vulnerability CVE-2022-22965 💀https://github.com/Hghost0x00/CVE-2022-22965POC详情
104Nonehttps://github.com/dbwlsdnr95/CVE-2022-22965-spring4shellPOC详情
105Nonehttps://github.com/nhattanhh/CVE-2022-22965POC详情
106CVE-2022-22965 - Spring4Shellhttps://github.com/Anon2Fear/CVE-2022-22965POC详情
三、漏洞 CVE-2022-22965 的情报信息
四、漏洞 CVE-2022-22965 的评论

暂无评论


发表评论