POC详情: da316bb361b82f130a0b2a95bb2035575203bf52

来源
关联漏洞
标题: Spring Framework 代码注入漏洞 (CVE-2022-22963)
描述:Spring Framework是美国Spring团队的一套开源的Java、JavaEE应用程序框架。该框架可帮助开发人员构建高质量的应用。 Spring Framework 存在代码注入漏洞。目前暂无该漏洞信息,请随时关注CNNVD或厂商公告。
介绍
# Spring Cloud Function Vulnerability (CVE-2022-22963) RCE
This is a python implemetation of Spring4Shell, CVE-2022-22963, 
affecting services running Spring Cloud Function <=3.1.6 (for 3.1.x) 
and <=3.2.2 (for 3.2.x)

Combination of multiple POCs online

Author: Randall Banner

Date: 17/04/23

Description:
Script creates shell.sh in current directory, with a simple bash reverse shell
one-liner. Then starts a webserver to serve it to the victim via wget (output in 
/dev/shm folder), next it makes shell.sh executable and finally runs it.

Don't forget to start Netcat before running script!
文件快照

[4.0K] /data/pocs/da316bb361b82f130a0b2a95bb2035575203bf52 ├── [ 596] README.md └── [4.1K] spring-cloud-rce.py 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。