CVE-2022-22963
CRITICAL KEV NUCLEIVmware Spring Cloud Function < 3.1.6 - Remote Code Execution
Title source: ruleDescription
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
Exploits (35)
exploitdb
WORKING POC
by GatoGamer1155 · pythonwebappsjava
https://www.exploit-db.com/exploits/51577
nomisec
WORKING POC
24 stars
by J0ey17 · remote
https://github.com/J0ey17/CVE-2022-22963_Reverse-Shell-Exploit
github
FAILED
5 stars
by JAckLosingHeart · javapoc
https://github.com/JAckLosingHeart/CVE-PoC-Collection/tree/main/spring-CVE-2022-22963
nomisec
WORKING POC
4 stars
by randallbanner · remote
https://github.com/randallbanner/Spring-Cloud-Function-Vulnerability-CVE-2022-22963-RCE
nomisec
WORKING POC
4 stars
by lemmyz4n3771 · remote
https://github.com/lemmyz4n3771/CVE-2022-22963-PoC
nomisec
WORKING POC
4 stars
by iliass-dahman · remote
https://github.com/iliass-dahman/CVE-2022-22963-POC
github
FAILED
1 stars
by JorgeRh4ck · pythonpoc
https://github.com/JorgeRh4ck/CVE-Exploits/tree/main/CVE-2022-22963
github
FAILED
1 stars
by Shockp · pythonpoc
https://github.com/Shockp/CVE-Exploits/tree/main/CVE-2022-22963 (Spring Cloud Function)
nomisec
WORKING POC
1 stars
by SealPaPaPa · poc
https://github.com/SealPaPaPa/SpringCloudFunction-Research
nomisec
WORKING POC
1 stars
by AayushmanThapaMagar · poc
https://github.com/AayushmanThapaMagar/CVE-2022-22963
gitlab
by java-exploit · poc
https://gitlab.com/penetration-test-learn/10vuln/java-exploit/CVE-2022-22963
gitlab
by java-exploit · poc
https://gitlab.com/penetration-test-learn/10vuln/java-exploit/Spring0DayCoreExploit
nomisec
WORKING POC
by BearClaw96 · remote
https://github.com/BearClaw96/CVE-2022-22963-Poc-Bearcules
nomisec
WORKING POC
by nikn0laty · remote
https://github.com/nikn0laty/RCE-in-Spring-Cloud-CVE-2022-22963
metasploit
WORKING POC
EXCELLENT
by m09u3r, hktalent, Spencer McIntyre · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/spring_cloud_function_spel_injection.rb
Nuclei Templates (1)
Spring Cloud - Remote Code Execution
CRITICALby Mr-xn,Adam Crosser
References (7)
Scores
CVSS v3
9.8
EPSS
0.9446
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2022-08-25
VulnCheck KEV
2022-08-19
InTheWild.io
2022-03-31
ENISA EUVD
EUVD-2022-1654
CWE
CWE-917
CWE-94
Status
published
Products (47)
oracle/banking_branch
14.5
oracle/banking_cash_management
14.5
oracle/banking_corporate_lending_process_management
14.5
oracle/banking_credit_facilities_process_management
14.5
oracle/banking_electronic_data_exchange_for_corporates
14.5
oracle/banking_liquidity_management
14.2
oracle/banking_liquidity_management
14.5
oracle/banking_origination
14.5
oracle/banking_supply_chain_finance
14.5
oracle/banking_trade_finance_process_management
14.5
... and 37 more
Published
Apr 01, 2022
KEV Added
Aug 25, 2022
Tracked Since
Feb 18, 2026