Skip to main content

CVE-2022-22965

Description

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

NVD
Severity: CRITICAL
CVE ID: CVE-2022-22965
CVSS Score: 9.8
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Refrence: NVDMITRE

Proof Of Concept

Nuclei Templates for CVE-2022-22965
BobTheShoplifter

Spring4Shell Proof Of Concept/And vulnerable application CVE-2022-22965

Refrence: GitHub

Mr-xn

CVE-2022-22965 : about spring core rce

Refrence: GitHub

TheGejr

Spring4Shell - Spring Core RCE - CVE-2022-22965

Refrence: GitHub

reznok

Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit

Refrence: GitHub

light-Life

spring-core单个图形化利用工具,CVE-2022-22965及修复方案已出

Refrence: GitHub

DDuarte

CVE-2022-22965 - CVE-2010-1622 redux

Refrence: GitHub

k3rwin

spring框架RCE漏洞 CVE-2022-22965

Refrence: GitHub

liangyueliangyue

springFramework_CVE-2022-22965_RCE简单利用

Refrence: GitHub

Kirill89

Refrence: GitHub

FourCoreLabs

Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.

Refrence: GitHub

alt3kx

Spring Framework RCE (Quick pentest notes)

Refrence: GitHub

GuayoyoCyber

Vulnerabilidad RCE en Spring Framework vía Data Binding on JDK 9+ (CVE-2022-22965 aka "Spring4Shell")

Refrence: GitHub

colincowie

A Safer PoC for CVE-2022-22965 (Spring4Shell)

Refrence: GitHub

rwincey

Refrence: GitHub

viniciuspereiras

CVE-2022-22965 poc including reverse-shell support

Refrence: GitHub

mebibite

Created after the disclosure of CVE-2022-22965 and CVE-2022-22963. Bash script that detects Spring Framework occurrences in your projects and systems, allowing you to get insight on versions used. Unpacks JARs and analyses their Manifest files.

Refrence: GitHub

likewhite

CVE-2022-22965 EXP

Refrence: GitHub

Axx8

SpringFramework 远程代码执行漏洞CVE-2022-22965

Refrence: GitHub

snicoll-scratches

Showcase of overridding the Spring Framework version in older Spring Boot versions

Refrence: GitHub

nu0l

Spring-0day/CVE-2022-22965

Refrence: GitHub

tangxiaofeng7

批量无损检测CVE-2022-22965

Refrence: GitHub

helsecert

Refrence: GitHub

lcarea

Refrence: GitHub

Joe1sn

CVE-2022-22965 Environment

Refrence: GitHub

zer0yu

Spring4Shell (CVE-2022-22965)

Refrence: GitHub

me2nuk

Spring Framework RCE via Data Binding on JDK 9+ / spring4shell / CVE-2022-22965

Refrence: GitHub

wshon

CVE-2022-22965

Refrence: GitHub

Wrin9

CVE-2022-22965 POC

Refrence: GitHub

wjl110

CVE-2022-22965\Spring-Core-RCE堪比关于 Apache Log4j2核弹级别漏洞exp的rce一键利用

Refrence: GitHub

mwojterski

Refrence: GitHub

gpiechnik2

Nmap Spring4Shell NSE script for Spring Boot RCE (CVE-2022-22965)

Refrence: GitHub

itsecurityco

Docker PoC for CVE-2022-22965 with Spring Boot version 2.6.5

Refrence: GitHub

daniel0x00

PowerShell port of CVE-2022-22965 vulnerability check by colincowie.

Refrence: GitHub

fracturelabs

Intentionally vulnerable Spring app to test CVE-2022-22965

Refrence: GitHub

sunnyvale-it

CVE-2022-22965 (Spring4Shell) Proof of Concept

Refrence: GitHub

twseptian

Spring4Shell - CVE-2022-22965

Refrence: GitHub

netcode

Another spring4shell (Spring core RCE) POC

Refrence: GitHub

fracturelabs

Vulnerability scanner for Spring4Shell (CVE-2022-22965)

Refrence: GitHub

Snip3R69

Spring has Confirmed the RCE in Spring Framework. The team has just published the statement along with the mitigation guides for the issue. Now, this vulnerability can be tracked as CVE-2022-22965.

Refrence: GitHub

luoqianlin

Spring Framework RCE Exploit

Refrence: GitHub

0xrobiul

Exploit Of Spring4Shell!

Refrence: GitHub

LudovicPatho

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

Refrence: GitHub

irgoncalves

Refrence: GitHub

datawiza-inc

The demo code showing the recent Spring4Shell RCE (CVE-2022-22965)

Refrence: GitHub

alt3kx

Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)

Refrence: GitHub

wikiZ

CVE-2022-22965 pocsuite3 POC

Refrence: GitHub

4nth0ny1130

CVE-2022-22965写入冰蝎webshell脚本

Refrence: GitHub

t3amj3ff

Spring4Shell PoC (CVE-2022-22965)

Refrence: GitHub

CalumHutton

Refrence: GitHub

fransvanbuul

Refrence: GitHub

jrgdiaz

Script to check for Spring4Shell vulnerability

Refrence: GitHub

Loneyers

Spring4Shell , Spring Framework RCE (CVE-2022-22965) , Burpsuite Plugin

Refrence: GitHub

p1ckzi

spring4shell | CVE-2022-22965

Refrence: GitHub

Omaraitbenhaddi

exploitation script tryhackme

Refrence: GitHub

c4mx

Refrence: GitHub

mariomamo

Refrence: GitHub

khidottrivi

Refrence: GitHub

Enokiy

Refrence: GitHub

cxzero

CVE-2022-22965 Spring4Shell research & PoC

Refrence: GitHub

tpt11fb

burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977

Refrence: GitHub

D1mang

EXP for Spring4Shell(CVE-2022-22965)

Refrence: GitHub

iloveflag

CVE-2022-22965图形化检测工具

Refrence: GitHub

ClemExp

Refrence: GitHub

clemoregan

CVE-2022-22965 proof of concept

Refrence: GitHub

devengpk

Refrence: GitHub

zangcc

CVE-2022-22965\Spring-Core-RCE核弹级别漏洞的rce图形化GUI一键利用工具,基于JavaFx开发,图形化操作更简单,提高效率。

Refrence: GitHub

ajith737

User friendly Spring4Shell POC

Refrence: GitHub

c33dd

🚀 Exploit for Spring core RCE in C [ wip ]

Refrence: GitHub

gokul-ramesh

Demonstrable Proof of Concept Exploit for Spring4Shell Vulnerability (CVE-2022-22965)

Refrence: GitHub

bL34cHig0

A simple python script for a firewall rule that blocks incoming requests based on the Spring4Shell (CVE-2022-22965) vulnerability

Refrence: GitHub

BKLockly

Poc&Exp,支持批量扫描,反弹shell

Refrence: GitHub

dbgee

Spring rce environment for CVE-2022-22965

Refrence: GitHub

jakabakos

PoC and exploit for CVE-2022-22965 Spring4Shell

Refrence: GitHub

h4ck0rman

A quick python script that automates the exploitation of the second deadliest Java based vulnerability CVE-2022-22965.

Refrence: GitHub

sohamsharma966

Refrence: GitHub

LucasPDiniz

Spring4Shell Vulnerability RCE - CVE-2022-22965

Refrence: GitHub

xsxtw

Refrence: GitHub

Content on GitHub

jschauma | watchers:23

check-springshell
try to determine if a host is vulnerable to SpringShell CVE‐2022‐22965 and CVE‐2022‐22963

Refrence: GitHub

kh4sh3i | watchers:14

Spring-CVE
This includes CVE-2022-22963, a Spring SpEL / Expression Resource Access Vulnerability, as well as CVE-2022-22965, the spring-webmvc/spring-webflux RCE termed "SpringShell".

Refrence: GitHub