关联漏洞
描述
An exploit for the CVE-2022-22963 (Spring Cloud Function Vulnerability)
介绍
# Exploit-for-CVE-2022-22963
Exploit using curl to get a reverse shell in vulnerable spring cloud environments.
This exploit abuses the functionRouter URI, by injecting code into the `eval` function of the Spring Framework through a post request with a header that gives us Remote Code Execution (RCE).
<p align="center">
<img src="images/2023-06-29_01-30.png" width="650" title="Terminal print">
</p>
### Created by
[Henri Vlasic](https://github.com/HenriVlasic)
- [Linkedin](https://www.linkedin.com/in/henri-vlasic/)
[Arthur Valverde](https://github.com/arthurvmbl)
- [Linkedin](https://www.linkedin.com/in/uartuo/)
文件快照
[4.0K] /data/pocs/156bacdffcc4c71a2a61cd7681d1bae449db91ee
├── [4.0K] images
│ └── [577K] 2023-06-29_01-30.png
├── [ 628] README.md
└── [1.1K] spring-injection.sh
1 directory, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。