Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-22954 PoC — VMware 多款产品代码注入漏洞

Source
Associated Vulnerability
Title:VMware 多款产品代码注入漏洞 (CVE-2022-22954)
Description:Vmware Workspace One Access是美国Vmware公司的将用户身份与设备和网络信息等因素结合起来,为 Workspace One 交付的应用程序制定智能驱动的条件访问决策。 VMware 多款产品存在代码注入漏洞,该漏洞源于不正确的输入验证。远程攻击者利用该漏洞发送特制的HTTP请求并执行服务器端模板注入。
Description
提供批量扫描URL以及执行命令功能。Workspace ONE Access 模板注入漏洞,可执行任意代码
Readme
# CVE-2022-22954
## 漏洞描述
  Workspace ONE Access 提供统一应用门户,通过门户可安全访问企业的所有应用,可用于单点登录。CVE-2022-22954 中,攻击者可构造恶意请求造成模板注入,执行任意代码,控制服务器。
## 参考文章
  https://www.tenable.com/blog/vmware-patches-multiple-vulnerabilities-in-workspace-one-vmsa-2022-0011

# 使用说明
## 批量扫描模式
```
python3 CVE-2022-22954.py -m scan -f 123.txt
```
![scan_mode](scan_mode.png)

## 命令执行模式
```
python3 CVE-2022-22954.py -u https://xxx.xxx.com:8443 -c id
```
![rce_mode](rce_mode.png)
File Snapshot

[4.0K] /data/pocs/4b3b6809769b9269c9389ff024347d7643db9f70 ├── [4.4K] CVE-2022-22954.py ├── [ 39K] rce_mode.png ├── [ 623] README.md ├── [ 35] requirements.txt └── [ 56K] scan_mode.png 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.