CVE-2022-22965
Description
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
Severity: CRITICAL
CVE ID: CVE-2022-22965
CVSS Score: 9.8
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Proof Of Concept
Nuclei Templates for CVE-2022-22965
Refrence: Project Discovery GitHub
BobTheShoplifter
Spring4Shell Proof Of Concept/And vulnerable application CVE-2022-22965
Refrence: GitHub
Mr-xn
CVE-2022-22965 : about spring core rce
Refrence: GitHub
TheGejr
Spring4Shell - Spring Core RCE - CVE-2022-22965
Refrence: GitHub
reznok
Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit
Refrence: GitHub
light-Life
spring-core单个图形化利用工具,CVE-2022-22965及修复方案已出
Refrence: GitHub
DDuarte
CVE-2022-22965 - CVE-2010-1622 redux
Refrence: GitHub
k3rwin
spring框架RCE漏洞 CVE-2022-22965
Refrence: GitHub
liangyueliangyue
springFramework_CVE-2022-22965_RCE简单利用
Refrence: GitHub
Kirill89
Refrence: GitHub
FourCoreLabs
Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.
Refrence: GitHub
alt3kx
Spring Framework RCE (Quick pentest notes)
Refrence: GitHub
GuayoyoCyber
Vulnerabilidad RCE en Spring Framework vía Data Binding on JDK 9+ (CVE-2022-22965 aka "Spring4Shell")
Refrence: GitHub
colincowie
A Safer PoC for CVE-2022-22965 (Spring4Shell)
Refrence: GitHub
rwincey
Refrence: GitHub
viniciuspereiras
CVE-2022-22965 poc including reverse-shell support
Refrence: GitHub
mebibite
Created after the disclosure of CVE-2022-22965 and CVE-2022-22963. Bash script that detects Spring Framework occurrences in your projects and systems, allowing you to get insight on versions used. Unpacks JARs and analyses their Manifest files.
Refrence: GitHub
likewhite
CVE-2022-22965 EXP
Refrence: GitHub
Axx8
SpringFramework 远程代码执行漏洞CVE-2022-22965
Refrence: GitHub
snicoll-scratches
Showcase of overridding the Spring Framework version in older Spring Boot versions
Refrence: GitHub
nu0l
Spring-0day/CVE-2022-22965
Refrence: GitHub
tangxiaofeng7
批量无损检测CVE-2022-22965
Refrence: GitHub
helsecert
Refrence: GitHub
lcarea
Refrence: GitHub
Joe1sn
CVE-2022-22965 Environment
Refrence: GitHub
zer0yu
Spring4Shell (CVE-2022-22965)
Refrence: GitHub
me2nuk
Spring Framework RCE via Data Binding on JDK 9+ / spring4shell / CVE-2022-22965
Refrence: GitHub
wshon
CVE-2022-22965
Refrence: GitHub
Wrin9
CVE-2022-22965 POC
Refrence: GitHub
wjl110
CVE-2022-22965\Spring-Core-RCE堪比关于 Apache Log4j2核弹级别漏洞exp的rce一键利用
Refrence: GitHub
mwojterski
Refrence: GitHub
gpiechnik2
Nmap Spring4Shell NSE script for Spring Boot RCE (CVE-2022-22965)
Refrence: GitHub
itsecurityco
Docker PoC for CVE-2022-22965 with Spring Boot version 2.6.5
Refrence: GitHub
daniel0x00
PowerShell port of CVE-2022-22965 vulnerability check by colincowie.
Refrence: GitHub
fracturelabs
Intentionally vulnerable Spring app to test CVE-2022-22965
Refrence: GitHub
sunnyvale-it
CVE-2022-22965 (Spring4Shell) Proof of Concept
Refrence: GitHub
twseptian
Spring4Shell - CVE-2022-22965
Refrence: GitHub
netcode
Another spring4shell (Spring core RCE) POC
Refrence: GitHub
fracturelabs
Vulnerability scanner for Spring4Shell (CVE-2022-22965)
Refrence: GitHub
Snip3R69
Spring has Confirmed the RCE in Spring Framework. The team has just published the statement along with the mitigation guides for the issue. Now, this vulnerability can be tracked as CVE-2022-22965.
Refrence: GitHub
luoqianlin
Spring Framework RCE Exploit
Refrence: GitHub
0xrobiul
Exploit Of Spring4Shell!
Refrence: GitHub
LudovicPatho
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
Refrence: GitHub
irgoncalves
Refrence: GitHub
datawiza-inc
The demo code showing the recent Spring4Shell RCE (CVE-2022-22965)
Refrence: GitHub
alt3kx
Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)
Refrence: GitHub
wikiZ
CVE-2022-22965 pocsuite3 POC
Refrence: GitHub
4nth0ny1130
CVE-2022-22965写入冰蝎webshell脚本
Refrence: GitHub
t3amj3ff
Spring4Shell PoC (CVE-2022-22965)
Refrence: GitHub
CalumHutton
Refrence: GitHub
fransvanbuul
Refrence: GitHub
jrgdiaz
Script to check for Spring4Shell vulnerability
Refrence: GitHub
Loneyers
Spring4Shell , Spring Framework RCE (CVE-2022-22965) , Burpsuite Plugin
Refrence: GitHub
p1ckzi
spring4shell | CVE-2022-22965
Refrence: GitHub
Omaraitbenhaddi
exploitation script tryhackme
Refrence: GitHub
c4mx
Refrence: GitHub
mariomamo
Refrence: GitHub
khidottrivi
Refrence: GitHub
Enokiy
Refrence: GitHub
cxzero
CVE-2022-22965 Spring4Shell research & PoC
Refrence: GitHub
tpt11fb
burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977
Refrence: GitHub
D1mang
EXP for Spring4Shell(CVE-2022-22965)
Refrence: GitHub
iloveflag
CVE-2022-22965图形化检测工具
Refrence: GitHub
ClemExp
Refrence: GitHub
clemoregan
CVE-2022-22965 proof of concept
Refrence: GitHub
devengpk
Refrence: GitHub
zangcc
CVE-2022-22965\Spring-Core-RCE核弹级别漏洞的rce图形化GUI一键利用工具,基于JavaFx开发,图形化操作更简单,提高效率。
Refrence: GitHub
ajith737
User friendly Spring4Shell POC
Refrence: GitHub
c33dd
🚀 Exploit for Spring core RCE in C [ wip ]
Refrence: GitHub
gokul-ramesh
Demonstrable Proof of Concept Exploit for Spring4Shell Vulnerability (CVE-2022-22965)
Refrence: GitHub
bL34cHig0
A simple python script for a firewall rule that blocks incoming requests based on the Spring4Shell (CVE-2022-22965) vulnerability
Refrence: GitHub
BKLockly
Poc&Exp,支持批量扫描,反弹shell
Refrence: GitHub
dbgee
Spring rce environment for CVE-2022-22965
Refrence: GitHub
jakabakos
PoC and exploit for CVE-2022-22965 Spring4Shell
Refrence: GitHub
h4ck0rman
A quick python script that automates the exploitation of the second deadliest Java based vulnerability CVE-2022-22965.
Refrence: GitHub
sohamsharma966
Refrence: GitHub
LucasPDiniz
Spring4Shell Vulnerability RCE - CVE-2022-22965
Refrence: GitHub
xsxtw
Refrence: GitHub
Content on GitHub
jschauma | watchers:23
check-springshell
try to determine if a host is vulnerable to SpringShell CVE‐2022‐22965 and CVE‐2022‐22963
Refrence: GitHub
kh4sh3i | watchers:14
Spring-CVE
This includes CVE-2022-22963, a Spring SpEL / Expression Resource Access Vulnerability, as well as CVE-2022-22965, the spring-webmvc/spring-webflux RCE termed "SpringShell".
Refrence: GitHub