Skip to content

Spring Cloud Gateway远程代码执行漏洞POC,基于命令执行的基础上,增加了反弹shell操作

Notifications You must be signed in to change notification settings

M0ge/CVE-2022-22947-Spring-Cloud-Gateway-SpelRCE

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 

Repository files navigation

CVE-2022-22947-Spring-Cloud-Gateway-SpelRCE

CVE-2022-22947简介

危害等级:高危
POC/EXP情况:已公开
CNVD编号:CNNVD-2022-16402
影响范围:
  Spring Cloud GateWay 3.1.0
  Spring Cloud GateWay >=3.0.0,<=3.0.6
  Spring Cloud GateWay <3.0.0

漏洞描述

Spring Cloud Gateway存在远程代码执行漏洞,该漏洞是发生在Spring Cloud Gateway应用程序的Actuator端点,其在启用、公开和不安全的情况下容易受到代码注入的攻击。攻击者可利用该漏洞通过恶意创建允许在远程主机上执行任意远程请求。

CVE-2022-22947.py

为了方便,写了一个脚本,方便执行和反弹shell

执行正常命令

python3 CVE-2022-22947.py http://localhost:9000

image

image

反弹shell

1、首先nc开启监听

nc -lvvp 5000

image

2、输入shell,跳转到反弹shell操作 image

3、输入反弹shell命令即可获取shell image

About

Spring Cloud Gateway远程代码执行漏洞POC,基于命令执行的基础上,增加了反弹shell操作

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages