![]() |
||
---|---|---|
.. | ||
CVE-2022-22963-POC.py | ||
README.md |
README.md
CVE-2022-22963
CVE-2022-22963 PoC
Slight modified for English translation and detection of https://github.com/chaosec2021/Spring-cloud-function-SpEL-RCE/blob/main/Spel_RCE_POC.py . By default whoami is executed on the target and a file vulnerable.txt is created with the URLs that are vulnerable.
REF
https://github.com/dinosn/CVE-2022-22963
https://avd.aliyun.com/search?q=CVE-2022-22963
https://www.cyberkendra.com/2022/03/rce-0-day-exploit-found-in-spring-cloud.html,
dc5128b80c