exploitdb
WORKING POC
by Carlos E. Vieira · pythonwebappsjava
https://www.exploit-db.com/exploits/50799
This exploit leverages CVE-2022-22947 in Spring Cloud Gateway to achieve remote code execution via SpEL injection in the actuator endpoint. It deploys a malicious route, executes a command, and retrieves the output.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway < 3.0.7 & < 3.1.1
No auth needed
Prerequisites:
Actuator endpoint exposed · Network access to target
nomisec
WORKING POC
222 stars
by lucksec · remote
https://github.com/lucksec/Spring-Cloud-Gateway-CVE-2022-22947
This repository contains a Python-based proof-of-concept exploit for CVE-2022-22947, a remote code execution vulnerability in Spring Cloud Gateway. The exploit leverages the Gateway Actuator endpoint to inject malicious SpEL expressions, executing arbitrary commands (e.g., 'id') on vulnerable systems.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway < 3.1.1, < 3.0.7
No auth needed
Prerequisites:
Exposed Gateway Actuator endpoint · Network access to the target
nomisec
WORKING POC
210 stars
by whwlsfb · remote
https://github.com/whwlsfb/cve-2022-22947-godzilla-memshell
This PoC demonstrates a memory shell injection for CVE-2022-22947, leveraging Spring Cloud Gateway's vulnerability to register a malicious handler method. It includes encryption/decryption and dynamic class loading to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions affected by CVE-2022-22947)
No auth needed
Prerequisites:
Access to a vulnerable Spring Cloud Gateway instance · Ability to send crafted HTTP requests
nomisec
WORKING POC
77 stars
by SecNN · poc
https://github.com/SecNN/CVE-2022-22947_Rce_Exp
This is a functional exploit for CVE-2022-22947, targeting Spring Cloud Gateway. It leverages the actuator endpoint to inject a malicious route configuration, enabling remote code execution via SpEL injection.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions prior to 3.1.1 or 3.0.7)
No auth needed
Prerequisites:
Exposed actuator endpoints · Network access to the target
nomisec
WORKING POC
72 stars
by tangxiaofeng7 · remote
https://github.com/tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway
This repository contains a functional exploit for CVE-2022-22947, a remote code execution vulnerability in Spring Cloud Gateway. The exploit leverages SpEL injection to execute arbitrary commands on vulnerable systems.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions with actuator endpoints exposed)
No auth needed
Prerequisites:
Actuator endpoints exposed · Network access to the target
nomisec
WORKING POC
59 stars
by 0730Nophone · client-side
https://github.com/0730Nophone/CVE-2022-22947-
This PoC exploits CVE-2022-22947, a SpEL injection vulnerability in Spring Cloud Gateway, to execute arbitrary commands and inject a Godzilla memory shell. The exploit leverages the Actuator API to achieve remote code execution.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions affected by CVE-2022-22947)
No auth needed
Prerequisites:
Exposed Spring Cloud Gateway Actuator API · Network access to the target
nomisec
WORKING POC
38 stars
by crowsec-edtech · poc
https://github.com/crowsec-edtech/CVE-2022-22947
This is a functional exploit for CVE-2022-22947, targeting Spring Cloud Gateway versions < 3.0.7 and < 3.1.1. It leverages SpEL injection via the Gateway Actuator endpoint to achieve remote code execution (RCE).
Classification
Working Poc 100%
Target:
Spring Cloud Gateway < 3.0.7, < 3.1.1
No auth needed
Prerequisites:
Gateway Actuator endpoint enabled and exposed · Unsecured actuator endpoints
nomisec
WORKING POC
36 stars
by 0x7eTeam · poc
https://github.com/0x7eTeam/CVE-2022-22947
This is a functional exploit for CVE-2022-22947, a Spring Cloud Gateway RCE vulnerability. It allows arbitrary command execution or reverse shell via malicious actuator endpoint manipulation.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions before 3.1.1 or 3.0.7)
No auth needed
Prerequisites:
Exposed actuator endpoints · Network access to target
nomisec
STUB
30 stars
by Tas9er · poc
https://github.com/Tas9er/SpringCloudGatewayRCE
The repository contains only a README with minimal details about a Spring Cloud Gateway RCE exploit, lacking actual exploit code or technical specifics. The author mentions a tool but provides no implementation or usage details beyond a placeholder image reference.
Target:
Spring Cloud Gateway (version unspecified)
No auth needed
Prerequisites:
unknown (no details provided)
nomisec
WORKING POC
28 stars
by Zh0um1 · remote
https://github.com/Zh0um1/CVE-2022-22947
This repository contains a Go-based exploit for CVE-2022-22947, which injects a Godzilla memory shell into a vulnerable Spring Cloud Gateway server. The exploit supports proxy functionality and leverages SpEL injection to achieve remote code execution.
Classification
Working Poc 90%
Target:
Spring Cloud Gateway (versions affected by CVE-2022-22947)
No auth needed
Prerequisites:
Access to the Spring Cloud Gateway actuator endpoint · Network connectivity to the target server
nomisec
WORKING POC
18 stars
by viemsr · poc
https://github.com/viemsr/spring_cloud_gateway_memshell
This repository contains a Python script that exploits CVE-2022-22947, a SpEL injection vulnerability in Spring Cloud Gateway, to inject in-memory webshells (Netty and Spring-based). The script sends a crafted request to the target server to achieve remote code execution.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions affected by CVE-2022-22947)
No auth needed
Prerequisites:
Target server running vulnerable Spring Cloud Gateway · Network access to the target
nomisec
WORKING POC
17 stars
by Enokiy · remote
https://github.com/Enokiy/cve-2022-22947-spring-cloud-gateway
This repository contains a proof-of-concept exploit for CVE-2022-22947, a remote code execution vulnerability in Spring Cloud Gateway. The exploit leverages SpEL injection in dynamically added routes via the Gateway Actuator endpoint to achieve arbitrary command execution.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway versions 3.1.0, 3.0.0 to 3.0.6, and older unsupported versions
No auth needed
Prerequisites:
Spring Cloud Gateway with exposed Gateway Actuator endpoint · Management endpoint configuration enabling gateway endpoint
nomisec
STUB
15 stars
by B0rn2d · poc
https://github.com/B0rn2d/Spring-Cloud-Gateway-Nacos
The repository contains minimal Spring Boot configuration files for a Nacos Discovery client but lacks exploit code or PoC logic for CVE-2022-22947. No offensive techniques or vulnerability triggers are present.
Target:
Spring Cloud Gateway with Nacos Discovery
No auth needed
Prerequisites:
Spring Cloud Gateway with Nacos Discovery integration
nomisec
WORKING POC
14 stars
by MoCh3n · poc
https://github.com/MoCh3n/CVE-2022-22947-Spring-Cloud-Gateway-SpelRCE
This is a functional exploit for CVE-2022-22947, targeting Spring Cloud Gateway's SpEL injection vulnerability via the Actuator endpoint. It allows arbitrary command execution and includes a reverse shell feature.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions 3.1.0, 3.0.0-3.0.6, and <3.0.0)
No auth needed
Prerequisites:
Actuator endpoint enabled and exposed · Unsecured Actuator configuration
nomisec
WORKING POC
13 stars
by k3rwin · poc
https://github.com/k3rwin/spring-cloud-gateway-rce
This repository contains a functional Python-based exploit for CVE-2022-22947, a SpEL injection vulnerability in Spring Cloud Gateway. The exploit leverages the Actuator API to execute arbitrary commands via crafted payloads, supporting both Linux and Windows targets.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions affected by CVE-2022-22947)
No auth needed
Prerequisites:
Target must have Spring Cloud Gateway with exposed Actuator API · Actuator endpoints must be accessible
nomisec
WORKING POC
13 stars
by Wrin9 · remote
https://github.com/Wrin9/CVE-2022-22947
This is a functional exploit PoC for CVE-2022-22947, targeting Spring Cloud Gateway. It leverages SpEL injection to achieve remote code execution by manipulating the gateway's route configuration via the actuator endpoint.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway < 3.1.1, Spring Cloud Gateway < 3.0.7
No auth needed
Prerequisites:
Exposed actuator endpoint · Network access to the target
nomisec
WORKING POC
12 stars
by 4nNns · remote
https://github.com/4nNns/CVE-2022-22947
This repository provides a detailed proof-of-concept for CVE-2022-22947, a Spring Cloud Gateway SpEL injection vulnerability leading to remote code execution. It includes environment setup instructions, exploit analysis, and payload examples for both non-echo and echo-based exploitation chains.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway versions below 3.1.1
No auth needed
Prerequisites:
Spring Cloud Gateway with actuator endpoints enabled · Access to the gateway's management endpoint
nomisec
WORKING POC
11 stars
by twseptian · remote
https://github.com/twseptian/cve-2022-22947
This repository provides a functional proof-of-concept for CVE-2022-22947, demonstrating SpEL code injection in Spring Cloud Gateway Actuator API. The exploit leverages malicious SpEL expressions to achieve remote code execution (RCE) by executing arbitrary commands (e.g., `id`).
Classification
Working Poc 100%
Target:
Spring Cloud Gateway (versions prior to 3.1.1 or 3.0.7)
No auth needed
Prerequisites:
Exposed Actuator API endpoint · Network access to the target
nomisec
WRITEUP
10 stars
by Vulnmachines · poc
https://github.com/Vulnmachines/spring-cve-2022-22947
This repository contains a README describing CVE-2022-22947, a code injection vulnerability in Spring Cloud Gateway. No exploit code or technical details are provided in the snippet.
Classification
Writeup 90%
Target:
Spring Cloud Gateway (versions prior to 3.1.1 or 3.0.7)
No auth needed
Prerequisites:
Access to a vulnerable Spring Cloud Gateway instance
nomisec
WORKING POC
9 stars
by dingxiao77 · remote
https://github.com/dingxiao77/-cve-2022-22947-
This repository contains a Python script that exploits CVE-2022-22947, a remote code execution vulnerability in Spring Cloud Gateway. The script checks for vulnerable endpoints and executes a payload to run arbitrary commands (e.g., 'id') via SpEL injection.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions 3.1.0 to 3.1.1, 3.0.0 to 3.0.7)
No auth needed
Prerequisites:
Actuator endpoints exposed (e.g., /actuator/gateway/routes) · Network access to the target
nomisec
WORKING POC
8 stars
by SiJiDo · remote
https://github.com/SiJiDo/CVE-2022-22947
This is a Python-based exploit for CVE-2022-22947, a Spring Framework RCE vulnerability. It leverages deserialization via a crafted payload to achieve remote code execution.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22947)
No auth needed
Prerequisites:
Exposed Spring application with vulnerable endpoint · Network access to target
nomisec
WORKING POC
7 stars
by anansec · remote
https://github.com/anansec/CVE-2022-22947_EXP
This repository contains a functional exploit for CVE-2022-22947, a remote code execution vulnerability in Spring Cloud Gateway. The exploit leverages the Actuator endpoint to inject and execute arbitrary commands via a crafted payload.
Classification
Working Poc 95%
Target:
VMWare Spring Cloud Gateway (versions 3.1.0, 3.0.0-3.0.6, and <3.0.0)
No auth needed
Prerequisites:
Actuator endpoint must be enabled, exposed, and unsecured
nomisec
WORKING POC
7 stars
by mrknow001 · poc
https://github.com/mrknow001/CVE-2022-22947
This repository contains a Python-based exploit for CVE-2022-22947, a SpEL injection vulnerability in Spring Cloud Gateway. The exploit allows remote command execution by crafting malicious requests to the actuator API.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions prior to 3.1.1 or 3.0.7)
No auth needed
Prerequisites:
Exposed actuator endpoint · Network access to the target
nomisec
WORKING POC
7 stars
by hunzi0 · poc
https://github.com/hunzi0/CVE-2022-22947-Rce_POC
This repository contains a Python-based PoC for CVE-2022-22947, a remote code execution vulnerability in Spring Cloud Gateway. The script tests multiple URLs for the vulnerability by sending a crafted payload to the actuator endpoint, which executes arbitrary commands via SpEL injection.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions 3.1.x prior to 3.1.1, 3.0.x prior to 3.0.7)
No auth needed
Prerequisites:
Access to the actuator/gateway endpoints · Target application must be vulnerable to CVE-2022-22947
nomisec
WORKING POC
6 stars
by Arrnitage · poc
https://github.com/Arrnitage/CVE-2022-22947_exp
This is a functional exploit for CVE-2022-22947, a Spring Cloud Gateway RCE vulnerability. It leverages SpEL injection via the actuator endpoint to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions 3.1.0 to 3.1.1, 3.0.0 to 3.0.7)
No auth needed
Prerequisites:
Exposed actuator endpoint · Network access to the target
nomisec
WORKING POC
6 stars
by YutuSec · poc
https://github.com/YutuSec/SpEL
This repository contains a Go-based exploit for CVE-2022-22947, a SpEL injection vulnerability in Spring Cloud Gateway. The PoC automates the detection and exploitation of the flaw by sending crafted HTTP requests to execute arbitrary commands (e.g., 'id') via the Actuator API.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions affected by CVE-2022-22947)
No auth needed
Prerequisites:
Exposed Actuator API endpoint · Network access to the target
nomisec
WORKING POC
6 stars
by darkb1rd · poc
https://github.com/darkb1rd/cve-2022-22947
This Go-based exploit leverages CVE-2022-22947, a SpEL injection vulnerability in Spring Cloud Gateway, to execute arbitrary commands via malicious route configurations. It interacts with the Actuator API to create, refresh, and delete routes, extracting command output from responses.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway versions 3.1.0 and below, 3.0.6 and below
No auth needed
Prerequisites:
Access to the Actuator API endpoint · Network connectivity to the target
nomisec
WORKING POC
5 stars
by Greetdawn · poc
https://github.com/Greetdawn/CVE-2022-22947
This repository contains a working PoC for CVE-2022-22947, a SpEL injection vulnerability in Spring Cloud Gateway. The exploit leverages the Actuator API to create a malicious route, refresh the configuration, and trigger arbitrary command execution via a crafted SpEL expression.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway versions 3.1.0 and 3.0.6 (and earlier)
No auth needed
Prerequisites:
Access to the Actuator API endpoints · Target running a vulnerable version of Spring Cloud Gateway
nomisec
WORKING POC
4 stars
by sagaryadav8742 · poc
https://github.com/sagaryadav8742/springcloudRCE
This PoC exploits CVE-2022-22947, a SpEL injection vulnerability in Spring Cloud Gateway, to achieve remote code execution. It includes functions for direct command execution and a reverse shell payload.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions 3.1.0 and 3.0.0-3.0.6)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Spring Cloud Gateway · Network access to the target application
nomisec
WORKING POC
3 stars
by LY613313 · poc
https://github.com/LY613313/CVE-2022-22947
This repository contains a functional proof-of-concept exploit for CVE-2022-22947, a remote code execution vulnerability in Spring Cloud Gateway. The exploit leverages SpEL injection via the Actuator endpoint to execute arbitrary commands, including reverse shells.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway 3.1.x < 3.1.1, Spring Cloud Gateway < 3.0.7
No auth needed
Prerequisites:
Actuator endpoint exposed and accessible · Spring Cloud Gateway vulnerable version
nomisec
WORKING POC
3 stars
by stayfoolish777 · remote
https://github.com/stayfoolish777/CVE-2022-22947-POC
This is a functional PoC for CVE-2022-22947, a remote code execution vulnerability in Spring Cloud Gateway. It exploits the actuator endpoint to inject a SpEL expression that executes arbitrary commands (e.g., 'id') via a crafted JSON payload.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway < 3.1.1, < 3.0.7
No auth needed
Prerequisites:
Exposed actuator endpoint · Network access to the target
nomisec
WORKING POC
3 stars
by nu0l · poc
https://github.com/nu0l/cve-2022-22947
This PoC exploits CVE-2022-22947, a SpEL injection vulnerability in Spring Cloud Gateway, by sending crafted JSON payloads to trigger DNS lookups via `InetAddress.getByName()`. It uses a DNS log service to confirm successful exploitation.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions 3.1.0, 3.0.0 to 3.0.6)
No auth needed
Prerequisites:
Target with vulnerable Spring Cloud Gateway exposed · Network access to the target's actuator endpoints
nomisec
WORKING POC
2 stars
by Le1a · remote
https://github.com/Le1a/CVE-2022-22947
This PoC exploits CVE-2022-22947, a SpEL injection vulnerability in Spring Cloud Gateway, allowing remote command execution via malicious route configuration. It demonstrates the full attack chain: route creation, refresh, and cleanup.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions with vulnerable Actuator endpoints)
No auth needed
Prerequisites:
Exposed Actuator endpoints · Network access to target
nomisec
SCANNER
2 stars
by kkx600 · poc
https://github.com/kkx600/Burp_VulPscan
This repository contains a Burp Suite extension designed to scan for CVE-2022-22947, a Spring Cloud Gateway vulnerability. The extension intercepts HTTP responses and checks for indicators of the vulnerability by sending crafted requests and analyzing responses.
Classification
Scanner 90%
Target:
Spring Cloud Gateway 3.1.0, 3.0.0 to 3.0.6
No auth needed
Prerequisites:
Access to a vulnerable Spring Cloud Gateway instance · Burp Suite for running the extension
nomisec
WORKING POC
2 stars
by Vancomycin-g · poc
https://github.com/Vancomycin-g/CVE-2022-22947
This repository contains a functional exploit for CVE-2022-22947, targeting Spring Cloud Gateway. It includes command execution, reverse shell capabilities via /dev/tcp and Java-based payloads, and network egress testing.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions affected by CVE-2022-22947)
No auth needed
Prerequisites:
Exposed actuator/gateway endpoints · Network access to target
nomisec
WORKING POC
2 stars
by 22ke · poc
https://github.com/22ke/CVE-2022-22947
This Go-based PoC exploits CVE-2022-22947, a remote code execution vulnerability in Spring Cloud Gateway's Actuator endpoint. It sends a series of HTTP requests to create a malicious route, execute a command via SpEL injection, and retrieve the output.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway 3.0.0-3.0.6, 3.1.0
No auth needed
Prerequisites:
Actuator endpoint enabled and exposed · Unsecured Actuator endpoint
nomisec
WORKING POC
2 stars
by dbgee · poc
https://github.com/dbgee/CVE-2022-22947
This repository provides a working proof-of-concept for CVE-2022-22947, a Spring Cloud Gateway RCE vulnerability. It includes a Spring Boot application demonstrating the vulnerable setup and routes.
Classification
Working Poc 90%
Target:
Spring Cloud Gateway (versions affected by CVE-2022-22947)
No auth needed
Prerequisites:
Java and Maven installed · Spring Cloud Gateway environment
nomisec
WORKING POC
1 stars
by qq87234770 · remote
https://github.com/qq87234770/CVE-2022-22947
This PoC exploits CVE-2022-22947, a Spring Cloud Gateway SpEL injection vulnerability, to achieve remote code execution (RCE). It allows command execution or reverse shell establishment via crafted payloads sent to the actuator endpoint.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions 3.1.0 to 3.1.1, 3.0.0 to 3.0.7)
No auth needed
Prerequisites:
Exposed actuator/gateway endpoints · Network access to the target
nomisec
WORKING POC
1 stars
by kmahyyg · poc
https://github.com/kmahyyg/CVE-2022-22947
This repository contains a working PoC for CVE-2022-22947, a remote code execution vulnerability in Spring Cloud Gateway. The exploit leverages SpEL injection via the actuator endpoint to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway < 3.1.1, < 3.0.7
No auth needed
Prerequisites:
Exposed actuator endpoint · Spring Cloud Gateway with vulnerable version
nomisec
WORKING POC
1 stars
by Wrong-pixel · poc
https://github.com/Wrong-pixel/CVE-2022-22947-exp
This repository contains a working exploit for CVE-2022-22947, a Spring Cloud Gateway RCE vulnerability. The exploit injects a memory shell via malicious route configuration and includes a reverse shell payload.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions affected by CVE-2022-22947)
No auth needed
Prerequisites:
Exposed actuator endpoint · Spring Cloud Gateway instance
nomisec
STUB
1 stars
by aesm1p · poc
https://github.com/aesm1p/CVE-2022-22947-POC-Reproduce
The repository contains minimal Spring Boot application code but lacks any exploit implementation or demonstration of CVE-2022-22947. No offensive techniques or vulnerability-specific logic are present.
Target:
Spring Cloud Gateway (theoretical)
No auth needed
Prerequisites:
None identified
nomisec
WORKING POC
1 stars
by talentsec · remote
https://github.com/talentsec/Spring-Cloud-Gateway-CVE-2022-22947
This PoC exploits CVE-2022-22947, a SpEL injection vulnerability in Spring Cloud Gateway, by adding a malicious route with a SpEL expression that executes the 'id' command. It then triggers the route and retrieves the command output from the response headers.
Classification
Working Poc 100%
Target:
Spring Cloud Gateway (versions 3.1.x prior to 3.1.1 and 3.0.x prior to 3.0.7)
No auth needed
Prerequisites:
Actuator endpoints exposed · Network access to the target
nomisec
WORKING POC
1 stars
by Jun-5heng · poc
https://github.com/Jun-5heng/CVE-2022-22947
This is a functional exploit for CVE-2022-22947, a remote code execution vulnerability in Spring Cloud Gateway. The PoC leverages the actuator endpoint to create a malicious route with a SpEL injection payload, enabling arbitrary command execution.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions 3.1.0 and 3.0.0 to 3.0.6)
No auth needed
Prerequisites:
Exposed actuator endpoint · Network access to the target
nomisec
WORKING POC
1 stars
by Nathaniel1025 · poc
https://github.com/Nathaniel1025/CVE-2022-22947
This is a functional PoC for CVE-2022-22947, a Spring Cloud Gateway SpEL RCE vulnerability. It injects a malicious route, refreshes the gateway, and retrieves command execution output via response headers.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions 3.1.0, 3.0.0-3.0.6)
No auth needed
Prerequisites:
Exposed actuator endpoints (/actuator/gateway/routes/code, /actuator/gateway/refresh)
nomisec
STUB
1 stars
by bysinks · poc
https://github.com/bysinks/CVE-2022-22947
The repository contains only a README.md file with basic information about CVE-2022-22947, including affected versions and a placeholder for execution instructions. No actual exploit code or technical details are provided.
Target:
Spring Cloud Gateway < 3.1.1, < 3.0.7
No auth needed
Prerequisites:
none provided
nomisec
STUB
by SanderSchepers1993 · poc
https://github.com/SanderSchepers1993/CyberSec2026
The repository contains only a minimal README with no exploit code or technical details. It appears to be a placeholder or stub with no substantive content related to CVE-2022-22947.
Target:
unknown
No auth needed
nomisec
WORKING POC
by shoucheng3 · poc
https://github.com/shoucheng3/spring-cloud__spring-cloud-gateway_CVE-2022-22947_3-0-6
This repository contains a proof-of-concept exploit for CVE-2022-22947, a vulnerability in Spring Cloud Gateway. The exploit demonstrates how an attacker can bypass security controls to achieve remote code execution (RCE) by leveraging improper input validation.
Classification
Working Poc 90%
Target:
Spring Cloud Gateway 3.0.6
No auth needed
Prerequisites:
Access to a vulnerable Spring Cloud Gateway instance · Network connectivity to the target
nomisec
WORKING POC
by skysliently · remote
https://github.com/skysliently/CVE-2022-22947-pb-ai
This repository contains a functional PoC for CVE-2022-22947, demonstrating RCE in Spring Cloud Gateway via SpEL injection through Actuator endpoints. The exploit leverages dynamic route addition with malicious SpEL expressions to execute arbitrary commands.
Classification
Working Poc 100%
Target:
Spring Cloud Gateway 3.1.0 (and other vulnerable versions)
No auth needed
Prerequisites:
Actuator endpoints exposed · Spring Cloud Gateway vulnerable version
nomisec
WORKING POC
by cc3305 · remote
https://github.com/cc3305/CVE-2022-22947
This is a functional exploit for CVE-2022-22947, a code injection vulnerability in Spring Cloud Gateway. It leverages SpEL injection to execute arbitrary commands via the gateway's actuator endpoints.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway versions prior to 3.1.1 and 3.0.7
No auth needed
Prerequisites:
Exposed actuator endpoints · Network access to the target
nomisec
WORKING POC
by superneilcn · poc
https://github.com/superneilcn/SpringExploitGUI
This repository contains a GUI-based exploit tool for CVE-2022-22947 (Spring Cloud Gateway RCE), supporting detection, command execution, reverse shell, and memory shell injection. It also includes exploits for CVE-2022-22963 and CVE-2022-22965.
Classification
Working Poc 90%
Target:
Spring Cloud Gateway (CVE-2022-22947), Spring Cloud Function (CVE-2022-22963), Spring Framework (CVE-2022-22965)
No auth needed
Prerequisites:
Vulnerable Spring Cloud Gateway instance · Network access to target
nomisec
WORKING POC
by Sumitpathania03 · remote
https://github.com/Sumitpathania03/CVE-2022-22947
This repository contains a detailed proof-of-concept for CVE-2022-22947, a critical SpEL injection vulnerability in Spring Cloud Gateway. The exploit leverages the Actuator API to execute arbitrary commands via a crafted JSON payload, leading to remote code execution.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway versions prior to 3.1.1+ and 3.0.7+
No auth needed
Prerequisites:
Gateway Actuator endpoint enabled, exposed, and unsecured
nomisec
WORKING POC
by scopion · poc
https://github.com/scopion/CVE-2022-22947-exp
This repository contains two Python scripts exploiting CVE-2022-22947, a Spring Cloud Gateway RCE vulnerability. The first script injects a memory shell, while the second establishes a reverse shell. Both leverage SpEL injection via the gateway's actuator endpoints.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions affected by CVE-2022-22947)
No auth needed
Prerequisites:
Exposed actuator endpoints · Spring Cloud Gateway with vulnerable version
nomisec
STUB
by hh-hunter · poc
https://github.com/hh-hunter/cve-2022-22947-docker
The repository contains only Docker Compose files for setting up vulnerable and non-vulnerable environments for CVE-2022-22947 but lacks actual exploit code or technical details. It serves as a minimal placeholder for testing the vulnerability.
Target:
Spring Cloud Gateway (version not specified)
No auth needed
Prerequisites:
Docker environment
nomisec
WORKING POC
by PaoPaoLong-lab · poc
https://github.com/PaoPaoLong-lab/Spring-CVE-2022-22947-
This PoC exploits CVE-2022-22947, a SpEL injection vulnerability in Spring Cloud Gateway, to achieve remote code execution (RCE) via malicious route configuration. It automates the process of adding a route, refreshing the gateway, retrieving command output, and cleaning up.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway 3.1.0, 3.0.0 to 3.0.6
No auth needed
Prerequisites:
Exposed actuator endpoints (/actuator/gateway/routes, /actuator/gateway/refresh) · Network access to the target
nomisec
WORKING POC
by fbion · poc
https://github.com/fbion/CVE-2022-22947
This is a functional exploit for CVE-2022-22947, a SpEL (Spring Expression Language) code injection vulnerability in Spring Cloud Gateway. It leverages the Actuator API to execute arbitrary commands by crafting malicious payloads in the route configuration.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions 3.1.x prior to 3.1.1, 3.0.x prior to 3.0.7)
No auth needed
Prerequisites:
Exposed Actuator API endpoint · Network access to the target
nomisec
WORKING POC
by nanaao · poc
https://github.com/nanaao/CVE-2022-22947-POC
This is a functional PoC for CVE-2022-22947, a Spring Cloud Gateway RCE vulnerability. It exploits SpEL injection via the actuator endpoint to execute arbitrary commands (default: 'id') and includes routines for route refresh, command output retrieval, and cleanup.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions before 3.1.1 or 3.0.7)
No auth needed
Prerequisites:
Actuator endpoints exposed · Spring Cloud Gateway with vulnerable version
nomisec
STUB
by flying0er · poc
https://github.com/flying0er/CVE-2022-22947-goby
The repository contains only a README file mentioning CVE-2022-22947 and a reference to a 'goby' PoC, but no actual exploit code or technical details are provided.
Target:
unknown
No auth needed
nomisec
WORKING POC
by BerMalBerIst · poc
https://github.com/BerMalBerIst/CVE-2022-22947
This PoC exploits CVE-2022-22947, a SpEL injection vulnerability in Spring Cloud Gateway, to achieve remote code execution (RCE) by injecting a malicious SpEL expression into the gateway route configuration. The exploit sends crafted HTTP requests to execute arbitrary commands (e.g., 'time') via the Spring Expression Language (SpEL).
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions 3.1.0 and 3.0.0 to 3.0.6)
No auth needed
Prerequisites:
Access to the actuator/gateway endpoints · Spring Cloud Gateway with vulnerable version
nomisec
WORKING POC
by Summer177 · remote
https://github.com/Summer177/Spring-Cloud-Gateway-CVE-2022-22947
This is a functional PoC for CVE-2022-22947, a remote code execution vulnerability in Spring Cloud Gateway. It exploits SpEL injection via the gateway actuator endpoints to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions before 3.1.1 or 3.0.7)
No auth needed
Prerequisites:
Exposed actuator endpoints (/actuator/gateway/routes and /actuator/gateway/refresh) · Network access to the target
nomisec
WORKING POC
by scopion · poc
https://github.com/scopion/cve-2022-22947
This PoC exploits CVE-2022-22947, a SpEL injection vulnerability in Spring Cloud Gateway, to achieve remote code execution (RCE) via crafted actuator endpoint requests. The exploit constructs a malicious route configuration that executes arbitrary commands through Java's Runtime.exec.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions 3.1.0 to 3.1.1, 3.0.0 to 3.0.7)
No auth needed
Prerequisites:
Exposed actuator endpoints · Network access to the target
vulncheck_xdb
WRITEUP
remote
https://github.com/Londly01/poc-hub
This repository contains detailed technical writeups for multiple vulnerabilities, including SQL injection, file read, and deserialization flaws. Each writeup includes vulnerability descriptions, environment setup, and exploitation steps, demonstrating a deep understanding of the vulnerabilities.
Classification
Writeup 95%
Attack Type
Sqli | Info Leak | Deserialization
Target:
360天擎终端安全管理系统, ACME Mini_httpd, Adobe ColdFusion
No auth needed
Prerequisites:
access to vulnerable endpoint · knowledge of exploit techniques
vulncheck_xdb
WORKING POC
remote
https://github.com/savior-only/CVE-2022-22947
This repository contains a graphical tool for exploiting CVE-2022-22947 (Spring Cloud Gateway RCE) and CVE-2022-22963 (Spring Cloud Function SpEL RCE). It includes functional exploit code and detailed PoC requests for both vulnerabilities.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (3.1.0, 3.0.0-3.0.6, <3.0.0) and Spring Cloud Function (3.0.0.RELEASE-3.2.2)
No auth needed
Prerequisites:
Actuator endpoints exposed and unsecured · Network access to the target
vulncheck_xdb
WORKING POC
remote
https://github.com/Axx8/CVE-2022-22947_Rce_Exp
This repository contains a functional exploit for CVE-2022-22947, a remote code execution vulnerability in Spring Cloud Gateway. The exploit leverages the actuator endpoint to inject and execute arbitrary commands via a crafted SpEL expression.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway (versions before 3.1.1 or 3.0.7)
No auth needed
Prerequisites:
Actuator endpoints exposed · Network access to the target
vulncheck_xdb
WORKING POC
remote
https://github.com/jm33-m0/emp3r0r
This repository contains a functional exploit for CVE-2022-22947, a Spring Cloud Gateway vulnerability allowing remote code execution. The provided code includes agent and C2 server components, indicating a complete exploit chain.
Classification
Working Poc 90%
Target:
Spring Cloud Gateway (versions affected by CVE-2022-22947)
No auth needed
Prerequisites:
access to vulnerable Spring Cloud Gateway instance · network connectivity to target
metasploit
WORKING POC
EXCELLENT
by Ayan Saha · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/spring_cloud_gateway_rce.rb
This Metasploit module exploits CVE-2022-22947, an unauthenticated RCE in Spring Cloud Gateway via SpEL injection through the Gateway Actuator endpoint. It creates a malicious route, triggers execution via a refresh, and cleans up the route afterward.
Classification
Working Poc 100%
Target:
Spring Cloud Gateway versions = 3.1.0 and 3.0.0 to 3.0.6
No auth needed
Prerequisites:
Gateway Actuator endpoint enabled, exposed, and unsecured