nomisec
WORKING POC
374 stars
by BobTheShoplifter · remote
https://github.com/BobTheShoplifter/Spring4Shell-POC
This repository contains a functional proof-of-concept exploit for CVE-2022-22965 (Spring4Shell), which achieves remote code execution by leveraging a vulnerability in the Spring Framework. The exploit writes a JSP webshell to the target server and provides a URL to interact with it.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Target must be running a vulnerable version of the Spring Framework · Target must be accessible over HTTP/HTTPS
nomisec
WORKING POC
325 stars
by reznok · remote
https://github.com/reznok/Spring4Shell-POC
This repository contains a functional proof-of-concept exploit for CVE-2022-22965 (Spring4Shell), demonstrating remote code execution via log file manipulation in a vulnerable Spring application. The exploit writes a JSP webshell to the target server, allowing command execution via HTTP requests.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Docker for running the vulnerable application · Python3 with requests library for executing the exploit
nomisec
SCANNER
154 stars
by tpt11fb · poc
https://github.com/tpt11fb/SpringVulScan
This repository contains a Burp Suite plugin named SpringVulScan designed to detect Spring framework vulnerabilities, including CVE-2022-22965. It includes DNS-based and callback-based detection mechanisms for various Spring CVEs.
Classification
Scanner 95%
Attack Type
Info Leak | Rce
Target:
Spring Framework (various versions)
No auth needed
Prerequisites:
Burp Suite · Network access to target · DNS resolution for callback detection
nomisec
WORKING POC
130 stars
by TheGejr · remote
https://github.com/TheGejr/SpringShell
This repository contains a functional proof-of-concept exploit for CVE-2022-22965, a critical RCE vulnerability in Spring Core. The exploit leverages a malicious request to deploy a JSP webshell, allowing arbitrary command execution via crafted HTTP requests.
Classification
Working Poc 95%
Target:
Spring Framework (versions with JDK 9+)
No auth needed
Prerequisites:
Target running vulnerable Spring Framework with JDK 9+ · Network access to the target application
nomisec
WORKING POC
102 stars
by zangcc · poc
https://github.com/zangcc/CVE-2022-22965-rexbb
This repository contains a JavaFX-based GUI tool for exploiting CVE-2022-22965, a Spring Core RCE vulnerability. It automates payload delivery and command execution, with a focus on simplicity and ease of use.
Classification
Working Poc 90%
Target:
Spring Framework (Spring Core)
No auth needed
Prerequisites:
Java 8 runtime environment · Access to a vulnerable Spring Boot application
nomisec
SCANNER
101 stars
by alt3kx · remote
https://github.com/alt3kx/CVE-2022-22965
This repository provides an Nmap NSE script to non-intrusively check for CVE-2022-22965 (Spring4Shell) by sending a crafted GET request and checking for a 400 response. It does not include an exploit payload but serves as a detection tool.
Classification
Scanner 90%
Target:
Spring Framework 5.2.x / 5.3.x
No auth needed
Prerequisites:
Target running Spring Framework 5.2.x or 5.3.x on JDK 9+ · Accessible endpoint with data binding
nomisec
WORKING POC
73 stars
by SecNN · poc
https://github.com/SecNN/SpringFramework_CVE-2022-22965_RCE
This repository contains a Python-based exploit for CVE-2022-22965, a Spring Framework RCE vulnerability. The exploit leverages malicious JSP file creation and command execution via crafted HTTP requests.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Target running vulnerable Spring Framework version · Network access to the target
nomisec
WORKING POC
63 stars
by 4nth0ny1130 · remote
https://github.com/4nth0ny1130/spring4shell_behinder
This is a Python-based exploit for CVE-2022-22965 (Spring4Shell), which automates the deployment of a JSP-based web shell on vulnerable Spring Core applications. It uses a multi-threaded approach to target multiple URLs and integrates with Behinder3.0 Beta9 for post-exploitation.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Vulnerable Spring application exposed to the internet · Python 3.x environment · Behinder3.0 Beta9 for post-exploitation
nomisec
WORKING POC
50 stars
by Mr-xn · poc
https://github.com/Mr-xn/spring-core-rce
This repository contains a functional exploit for CVE-2022-22965, a Spring Core RCE vulnerability. The PoC includes a Python script for vulnerability detection and webshell deployment, along with a direct curl command for exploitation.
Classification
Working Poc 95%
Target:
Spring Framework (JDK 9+)
No auth needed
Prerequisites:
Target running vulnerable Spring Framework with JDK 9+ · Access to the target URL
nomisec
WORKING POC
44 stars
by colincowie · remote
https://github.com/colincowie/Safer_PoC_CVE-2022-22965
This is a functional PoC for CVE-2022-22965 (Spring4Shell), which exploits a remote code execution vulnerability in Spring Core. It writes a file to the target server to confirm exploitation and includes validation checks to verify success.
Classification
Working Poc 95%
Target:
Spring Framework (versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19, and older unsupported versions)
No auth needed
Prerequisites:
Target application running a vulnerable version of Spring Framework · Access to the vulnerable endpoint
nomisec
WORKING POC
44 stars
by FourCoreLabs · poc
https://github.com/FourCoreLabs/spring4shell-exploit-poc
This repository contains a functional proof-of-concept exploit for CVE-2022-22965 (Spring4Shell), demonstrating remote code execution via a crafted HTTP request to a vulnerable Spring application running on Tomcat. The exploit writes a JSP webshell to the target server and executes arbitrary commands.
Classification
Working Poc 100%
Target:
Spring Framework (with JDK 9+, Tomcat, WAR deployment)
No auth needed
Prerequisites:
JDK 9+ · Spring application with WAR deployment · Tomcat as servlet container
nomisec
WORKING POC
41 stars
by tangxiaofeng7 · poc
https://github.com/tangxiaofeng7/CVE-2022-22965-Spring-Core-Rce
This repository contains a Go-based scanner and PoC for CVE-2022-22965, a Spring Core RCE vulnerability affecting JDK9+. The tool checks for vulnerability by sending crafted requests and can be used for both single and batch target detection.
Classification
Working Poc | Scanner 95%
Target:
Spring Core (JDK9+)
No auth needed
Prerequisites:
Target running Spring Core with JDK9+ · Access to the target's web interface
nomisec
WORKING POC
31 stars
by Kirill89 · remote
https://github.com/Kirill89/CVE-2022-22965-PoC
This repository contains a functional proof-of-concept exploit for CVE-2022-22965, demonstrating remote code execution (RCE) in Spring applications running on Tomcat via arbitrary file write. The exploit leverages Spring's property binding mechanism to manipulate Tomcat's classloader and create a malicious JSP file.
Classification
Working Poc 100%
Target:
Spring Framework (with Tomcat), versions affected by CVE-2022-22965
No auth needed
Prerequisites:
Java 9 or above · Tomcat as the servlet container · Spring application with vulnerable endpoint
nomisec
WORKING POC
28 stars
by k3rwin · poc
https://github.com/k3rwin/spring-core-rce
This repository contains a functional exploit for CVE-2022-22965, a Spring Core RCE vulnerability affecting JDK>=9. The PoC includes detection and exploitation capabilities, with payloads for both Linux and Windows systems.
Classification
Working Poc 95%
Target:
Spring Framework (JDK>=9)
No auth needed
Prerequisites:
Target running vulnerable Spring Framework with JDK>=9 · Network access to the target
nomisec
WORKING POC
26 stars
by liangyueliangyue · poc
https://github.com/liangyueliangyue/spring-core-rce
This repository contains a Python-based exploit for CVE-2022-22965, a Spring Core RCE vulnerability. It includes functionality to test for vulnerability presence and inject webshells (Behinder or Godzilla) into the target system.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Spring Framework · Network access to the target application
nomisec
WORKING POC
23 stars
by p1ckzi · poc
https://github.com/p1ckzi/CVE-2022-22965
This repository contains a Python-based exploit for CVE-2022-22965 (Spring4Shell), which targets the Java Spring Framework. The exploit manipulates Tomcat log variables to upload a JSP webshell, providing a pseudo-shell interface for command execution.
Classification
Working Poc 90%
Target:
Spring Framework (versions before 5.2.20, 5.3.0-18, and JDK 9+)
No auth needed
Prerequisites:
Python 3 · requests module · BeautifulSoup module · vulnerable Spring Framework instance
nomisec
WORKING POC
19 stars
by DDuarte · remote
https://github.com/DDuarte/springshell-rce-poc
This repository contains a functional PoC for CVE-2022-22965, a Spring Framework RCE vulnerability. It includes a vulnerable Spring application and a Python script to exploit it by deploying a JSP webshell via malicious parameter binding.
Classification
Working Poc 100%
Target:
Spring Framework (versions before 5.3.18 / 5.2.20)
No auth needed
Prerequisites:
JDK 9 or above · Standalone Tomcat with WAR deployment · Writable file system (e.g., webapps/ROOT) · No WebDataBinder blocklist
nomisec
WORKING POC
17 stars
by alt3kx · poc
https://github.com/alt3kx/CVE-2022-22965_PoC
This repository provides a proof-of-concept exploit for CVE-2022-22965, a remote code execution vulnerability in the Spring Framework. The exploit leverages a malicious payload to create a JSP webshell, allowing arbitrary command execution on the target system.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Target system with vulnerable Spring Framework version · Access to a POST/PUT endpoint on the target
nomisec
WORKING POC
17 stars
by Bouquets-ai · poc
https://github.com/Bouquets-ai/CVE-2022-22965-GUItools
This is a GUI-based exploit for CVE-2022-22965, a Spring Core RCE vulnerability. It crafts a malicious request to deploy a JSP webshell and execute arbitrary commands via a crafted HTTP request.
Classification
Working Poc 95%
Target:
Spring Framework (Spring Core)
No auth needed
Prerequisites:
Target application vulnerable to CVE-2022-22965 · Network access to the target
nomisec
WORKING POC
16 stars
by itsecurityco · remote
https://github.com/itsecurityco/CVE-2022-22965
This repository contains a functional PoC for CVE-2022-22965, a Spring Framework RCE vulnerability. It includes a Dockerized vulnerable Spring Boot application and curl commands to exploit the vulnerability by manipulating Tomcat's configuration and deploying a web shell.
Classification
Working Poc 95%
Target:
Spring Framework 5.3.17 (and Spring Boot applications using it)
No auth needed
Prerequisites:
Docker · Vulnerable Spring Boot application (Spring Framework 5.3.17 or earlier)
nomisec
WORKING POC
16 stars
by wjl110 · poc
https://github.com/wjl110/CVE-2022-22965_Spring_Core_RCE
This repository contains a functional exploit for CVE-2022-22965, a remote code execution vulnerability in Spring Core. The exploit manipulates log configurations to write a JSP webshell to a target directory, allowing arbitrary command execution.
Classification
Working Poc 95%
Target:
Spring Framework (JDK 9.0 and above)
No auth needed
Prerequisites:
Target running Spring Framework with JDK 9.0+ · Access to the target URL
nomisec
WORKING POC
14 stars
by me2nuk · remote
https://github.com/me2nuk/CVE-2022-22965
This repository contains a functional exploit for CVE-2022-22965 (Spring4Shell), demonstrating RCE via data binding on JDK 9+ by writing a JSP webshell to a target directory. The exploit leverages Spring Framework's vulnerability to achieve remote code execution.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Target running vulnerable Spring Framework on JDK 9+ · Access to the vulnerable endpoint
nomisec
WORKING POC
13 stars
by viniciuspereiras · remote
https://github.com/viniciuspereiras/CVE-2022-22965-poc
This repository contains a functional proof-of-concept exploit for CVE-2022-22965, a Spring Core RCE vulnerability. It includes features for reverse shell and password-protected shell access.
Classification
Working Poc 95%
Target:
Spring Core (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Vulnerable Spring Core application · Network access to the target
nomisec
SCANNER
12 stars
by fracturelabs · poc
https://github.com/fracturelabs/go-scan-spring
This repository contains a Go-based scanner for detecting CVE-2022-22965 (Spring4Shell) vulnerabilities. It includes safe scanning and exploitation capabilities to verify the presence of the vulnerability.
Classification
Scanner 95%
Target:
Spring Framework (Spring4Shell vulnerability)
No auth needed
Prerequisites:
Target URLs · Network access to the target
nomisec
WORKING POC
12 stars
by zer0yu · poc
https://github.com/zer0yu/CVE-2022-22965
This repository contains a Go-based proof-of-concept exploit for CVE-2022-22965 (Spring4Shell), an RCE vulnerability in the Spring Core framework. The tool supports both verification and exploitation modes, leveraging HTTP requests to trigger the vulnerability.
Classification
Working Poc 90%
Target:
Spring Core (JDK 9.0 and above)
No auth needed
Prerequisites:
Target running vulnerable Spring Core version · JDK 9.0 or higher
nomisec
SCANNER
8 stars
by gpiechnik2 · poc
https://github.com/gpiechnik2/nmap-spring4shell
This repository contains an Nmap NSE script designed to detect the Spring4Shell RCE vulnerability (CVE-2022-22965) by injecting a payload and checking for command execution. It tests for the presence of the vulnerability by executing a specified command (default: 'id') and verifying the output.
Classification
Scanner 90%
Target:
Spring Framework on JDK 9+
No auth needed
Prerequisites:
Nmap with NSE support · Access to the target HTTP service
nomisec
WORKING POC
7 stars
by sunnyvale-it · remote
https://github.com/sunnyvale-it/CVE-2022-22965-PoC
This repository contains a functional proof-of-concept exploit for CVE-2022-22965 (Spring4Shell), demonstrating remote code execution (RCE) via log file manipulation in Spring Core applications. The exploit writes a JSP webshell to the target server, allowing arbitrary command execution.
Classification
Working Poc 95%
Target:
Spring Framework (Spring Core) with JDK 9+
No auth needed
Prerequisites:
Vulnerable Spring application exposed · Access to the target endpoint · JDK 9 or later on the target
nomisec
WORKING POC
7 stars
by Wrin9 · remote
https://github.com/Wrin9/CVE-2022-22965
This PoC exploits CVE-2022-22965, a Spring Core RCE vulnerability, by crafting a malicious HTTP request to deploy a JSP webshell. It verifies exploitation by executing the 'id' command and checking the response for expected output.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Spring Framework · Network access to the target application
nomisec
WORKING POC
6 stars
by GuayoyoCyber · poc
https://github.com/GuayoyoCyber/CVE-2022-22965
This repository contains a functional proof-of-concept exploit for CVE-2022-22965 (Spring4Shell), a remote code execution vulnerability in Spring Framework. The exploit leverages data binding to deploy a JSP web shell on vulnerable systems.
Classification
Working Poc 95%
Target:
Spring Framework 5.3.0 to 5.3.17, 5.2.0 to 5.2.19
No auth needed
Prerequisites:
JDK 9+ · Apache Tomcat as Servlet container · Application packaged as WAR · Dependency on spring-webmvc or spring-webflux
nomisec
WORKING POC
6 stars
by wikiZ · poc
https://github.com/wikiZ/springboot_CVE-2022-22965
This is a functional PoC for CVE-2022-22965 (Spring4Shell), exploiting a remote code execution vulnerability in Spring Framework applications running on JDK 9+. It crafts a malicious request to deploy a JSP webshell and execute arbitrary commands.
Classification
Working Poc 95%
Target:
Spring Framework (Spring Boot applications)
No auth needed
Prerequisites:
Target running Spring Framework with vulnerable configuration · JDK 9 or newer · Exposed endpoint
nomisec
WORKING POC
5 stars
by mariomamo · remote
https://github.com/mariomamo/CVE-2022-22965
This repository contains a functional exploit for CVE-2022-22965 (Spring4Shell), including a vulnerable Spring Boot application, a Python-based exploit script, and a safe application for testing. The exploit achieves remote code execution by injecting a malicious JSP file into the target server.
Classification
Working Poc 95%
Target:
Spring Framework (versions before 5.2.20, 5.3.0-17, and 5.2.0-19) running on JDK 9 or later
No auth needed
Prerequisites:
Target application running vulnerable Spring Framework version · Java Development Kit (JDK) 9 or later · Access to the target application's endpoint
nomisec
WORKING POC
4 stars
by iloveflag · remote
https://github.com/iloveflag/Fast-CVE-2022-22965
This repository contains a functional exploit for CVE-2022-22965, a Spring Core RCE vulnerability. The exploit uses a PyQt5-based GUI to craft malicious requests that execute commands or spawn reverse shells on vulnerable Spring applications.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Vulnerable Spring application exposed · Network access to the target
nomisec
SCANNER
4 stars
by Loneyers · poc
https://github.com/Loneyers/Spring4Shell
This is a Burp Suite extension designed to detect CVE-2022-22965 (Spring4Shell) by sending a crafted request and checking for DNS interactions via Burp Collaborator. It does not include an exploit payload but confirms vulnerability through out-of-band interaction.
Classification
Scanner 95%
Target:
Spring Framework (5.3.0 to 5.3.17, 5.2.0 to 5.2.19, and older versions) running on JDK 9+ with Tomcat as WAR deployment
No auth needed
Prerequisites:
Target application must be a Spring MVC or Spring WebFlux application running on JDK 9+ with Tomcat as WAR deployment · Burp Suite for running the scanner
nomisec
WORKING POC
4 stars
by nu0l · remote
https://github.com/nu0l/CVE-2022-22965
This repository contains a proof-of-concept exploit for CVE-2022-22965, a Spring Framework RCE vulnerability. It includes both a detection script (DNS-based) and an exploit script that leverages the vulnerability to achieve remote code execution.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Spring Framework · Network access to the target application
nomisec
WORKING POC
4 stars
by wshon · poc
https://github.com/wshon/spring-framework-rce
This repository provides a proof-of-concept for CVE-2022-22965, a Spring Framework RCE vulnerability. It includes a Spring Boot application that demonstrates the vulnerability when deployed on specific versions of Tomcat and JDK.
Classification
Working Poc 90%
Target:
Spring Framework (specific versions not explicitly stated, but requires Tomcat 8.5.77 or 9.0.60 and JDK > 8)
No auth needed
Prerequisites:
Tomcat 8.5.77 or 9.0.60 · JDK > 8 · Deployment of the provided WAR file
nomisec
WORKING POC
3 stars
by 0xrobiul · remote
https://github.com/0xrobiul/CVE-2022-22965
This is a functional exploit for CVE-2022-22965 (Spring4Shell), which leverages a remote code execution vulnerability in Spring Core. The exploit uploads a JSP shell to a vulnerable Spring application by manipulating class loader properties via crafted HTTP headers and payloads.
Classification
Working Poc 95%
Target:
Spring Framework (versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19, and older unsupported versions)
No auth needed
Prerequisites:
Vulnerable Spring application exposed to the internet · Access to the target URL
nomisec
WORKING POC
3 stars
by BKLockly · remote
https://github.com/BKLockly/CVE-2022-22965
This repository contains a functional exploit for CVE-2022-22965, a Spring Cloud Gateway vulnerability allowing remote code execution via SpEL injection. The PoC includes both scanning and exploitation capabilities, with support for reverse shells and command execution.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway 3.1.0, 3.0.0 to 3.0.6
No auth needed
Prerequisites:
Target must be running a vulnerable version of Spring Cloud Gateway · Network access to the target
nomisec
WORKING POC
3 stars
by likewhite · remote
https://github.com/likewhite/CVE-2022-22965
This is a functional exploit PoC for CVE-2022-22965, a Spring Core RCE vulnerability. It leverages log file manipulation to achieve remote code execution by writing a malicious JSP file to the target server.
Classification
Working Poc 95%
Target:
Spring Framework (5.3.0 to 5.3.17, 5.2.0 to 5.2.19, and earlier versions)
No auth needed
Prerequisites:
Target must use Spring Framework with vulnerable versions · Target must use Tomcat with AccessLog enabled · JDK version 9 or higher
nomisec
WRITEUP
3 stars
by khidottrivi · poc
https://github.com/khidottrivi/CVE-2022-22965
This repository provides a detailed writeup and setup guide for analyzing CVE-2022-22965 (Spring4Shell), including environment configuration, debugging steps, and vulnerability analysis. It does not contain exploit code but explains the conditions required for exploitation.
Classification
Writeup 100%
Target:
Spring Framework (versions < 5.2.0, 5.2.0-5.2.19, 5.3.0-5.3.17) with Spring-webmvc or Spring-webflux, running on JDK >= 9 and deployed as a WAR file on Apache Tomcat
No auth needed
Prerequisites:
Spring Framework with vulnerable versions · Spring-webmvc or Spring-webflux dependency · JDK >= 9 · Application deployed as a WAR file on Apache Tomcat
nomisec
WORKING POC
3 stars
by CalumHutton · poc
https://github.com/CalumHutton/CVE-2022-22965-PoC_Payara
This repository contains a proof-of-concept exploit for CVE-2022-22965, demonstrating arbitrary file download in Payara/Glassfish via manipulation of the `docBase` property. The exploit uses a Spring application to expose the vulnerability and a shell script to trigger the attack.
Classification
Working Poc 95%
Target:
Payara/Glassfish (with Spring Framework)
No auth needed
Prerequisites:
Java 9 or above · Spring application running on Payara/Glassfish · Access to the target endpoint
nomisec
WORKING POC
3 stars
by netcode · remote
https://github.com/netcode/Spring4shell-CVE-2022-22965-POC
This repository contains a functional proof-of-concept exploit for CVE-2022-22965 (Spring4Shell), demonstrating remote code execution via a crafted HTTP request targeting vulnerable Spring Core applications. The exploit writes a JSP webshell to the target server, allowing arbitrary command execution.
Classification
Working Poc 95%
Target:
Spring Framework (5.3.0 to 5.3.17, 5.2.0 to 5.2.19, or older versions)
No auth needed
Prerequisites:
JDK 9 or higher · Apache Tomcat as servlet container · Packaged as traditional WAR · Spring-webmvc or spring-webflux dependency
nomisec
WORKING POC
2 stars
by bL34cHig0 · remote
https://github.com/bL34cHig0/Telstra-Cybersecurity-Virtual-Experience-
This repository contains a Python-based firewall rule to mitigate CVE-2022-22965 (Spring4Shell) by blocking specific request paths and headers associated with the exploit. The firewall_server.py script listens for incoming HTTP requests and blocks those matching predefined regex patterns.
Classification
Working Poc 90%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Python 3.x · Network access to the target server
nomisec
WORKING POC
2 stars
by jakabakos · remote
https://github.com/jakabakos/CVE-2022-22965-Spring4Shell
This repository contains a functional proof-of-concept exploit for CVE-2022-22965 (Spring4Shell), a remote code execution vulnerability in Spring Framework. The exploit leverages Tomcat's access log manipulation to write a JSP webshell, allowing arbitrary command execution.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Vulnerable Spring Framework application running on Tomcat · Network access to the target application
nomisec
WORKING POC
2 stars
by D1mang · poc
https://github.com/D1mang/Spring4Shell-CVE-2022-22965
This is a functional exploit for CVE-2022-22965 (Spring4Shell), which achieves remote code execution by uploading a malicious JSP file to a vulnerable Spring Core application. The exploit leverages the vulnerability in Spring's data binding mechanism to write a web shell to the target server.
Classification
Working Poc 95%
Target:
Spring Framework (versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19, and older unsupported versions)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Spring Framework · Target must be exposed to untrusted data (e.g., via web request)
nomisec
WORKING POC
2 stars
by datawiza-inc · poc
https://github.com/datawiza-inc/spring-rec-demo
This repository demonstrates CVE-2022-22965 (Spring4Shell) via a vulnerable Spring MVC controller that processes untrusted input through BeanWrapper, allowing arbitrary code execution. The test case shows nested property access, a key exploitation vector for this vulnerability.
Classification
Working Poc 90%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Exposed Spring MVC endpoint with data binding enabled · Java runtime environment
nomisec
WORKING POC
2 stars
by fracturelabs · poc
https://github.com/fracturelabs/spring4shell_victim
This repository provides an intentionally vulnerable Spring Boot application to demonstrate CVE-2022-22965 (Spring4Shell). It includes a Dockerized environment with JDK 11, Tomcat 9, and Spring 2.6.4, exposing vulnerable endpoints for testing exploitation techniques.
Classification
Working Poc 95%
Target:
Spring Framework 2.6.4 (with JDK 9+)
No auth needed
Prerequisites:
Docker · Java 11 · Tomcat 9 · Spring Framework 2.6.4
nomisec
WRITEUP
2 stars
by irgoncalves · poc
https://github.com/irgoncalves/irule-cve-2022-22965
This repository provides an iRule for mitigating CVE-2022-22965 (Spring4Shell) on BIG-IP 15.x. It does not contain exploit code but offers a mitigation strategy.
Classification
Writeup 90%
Target:
Spring Framework (mitigation for BIG-IP 15.x)
No auth needed
Prerequisites:
BIG-IP 15.x environment
nomisec
WORKING POC
2 stars
by LudovicPatho · poc
https://github.com/LudovicPatho/CVE-2022-22965_Spring4Shell
This repository contains a Python-based exploit for CVE-2022-22965 (Spring4Shell), which leverages data binding in the Spring Framework to achieve remote code execution (RCE) via a crafted HTTP request. The exploit uploads a JSP webshell to a vulnerable Tomcat server running a Spring application.
Classification
Working Poc 95%
Target:
Spring Framework (versions <5.2.20, 5.3.0-17) with Apache Tomcat
No auth needed
Prerequisites:
JDK 9+ · Apache Tomcat as the servlet container · Spring application packaged as WAR · Dependency on spring-webmvc or spring-webflux
nomisec
WORKING POC
2 stars
by twseptian · poc
https://github.com/twseptian/cve-2022-22965
This repository contains a functional PoC for CVE-2022-22965 (Spring4Shell), which exploits a remote code execution vulnerability in Spring Core. The exploit crafts a malicious POST request to deploy a JSP webshell, allowing arbitrary command execution via a crafted URL.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Target running vulnerable Spring Framework version · Network access to the target application
nomisec
WORKING POC
2 stars
by rwincey · poc
https://github.com/rwincey/spring4shell-CVE-2022-22965
This is a functional exploit for CVE-2022-22965 (Spring4Shell), which allows unauthenticated remote code execution on vulnerable Spring Framework applications. The PoC includes checks for vulnerability and the ability to upload a JSP webshell for command execution.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Vulnerable Spring Framework application exposed to the internet or target network
gitlab
WORKING POC
1 stars
by chiangyaw · remote
https://gitlab.com/chiangyaw/Spring4Shell-POC
This repository contains a functional exploit for CVE-2022-22965 (Spring4Shell), demonstrating remote code execution (RCE) via crafted HTTP requests to manipulate Tomcat log configurations and deploy a JSP webshell. The exploit leverages the vulnerability in Spring Framework's data binding mechanism to achieve arbitrary code execution.
Classification
Working Poc 95%
Target:
Spring Framework (with Tomcat)
No auth needed
Prerequisites:
Docker · Python3 with requests library · Vulnerable Spring/Tomcat environment
nomisec
WORKING POC
1 stars
by mylo-2001 · remote
https://github.com/mylo-2001/GhostStrike
This repository contains a functional exploit for CVE-2022-22965 (Spring4Shell), automating the exploitation process to achieve remote code execution via a reverse shell. It includes modules for payload generation and vulnerability checking, with a focus on automation and modularity.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Target URL with vulnerable Spring application · Attacker-controlled listener IP and port
nomisec
WORKING POC
1 stars
by salo-404 · poc
https://github.com/salo-404/firewall
This repository contains a Python-based HTTP firewall designed to detect and block exploitation attempts targeting CVE-2022-22965 (Spring4Shell). The firewall analyzes POST requests for malicious keys, payloads, and headers associated with the vulnerability.
Classification
Working Poc 90%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Vulnerable Spring Framework application · Network access to the target
nomisec
WORKING POC
1 stars
by cxzero · remote
https://github.com/cxzero/CVE-2022-22965-spring4shell
This repository contains multiple Python-based exploits for CVE-2022-22965 (Spring4Shell), a remote code execution vulnerability in Spring Framework. The exploits leverage log file manipulation to deploy a JSP web shell, allowing arbitrary command execution on vulnerable systems.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Vulnerable Spring Framework application exposed · Access to the target URL
nomisec
STUB
1 stars
by gokul-ramesh · poc
https://github.com/gokul-ramesh/Spring4Shell-PoC-exploit
The repository contains a stub exploit for CVE-2022-22965 (Spring4Shell) with a README describing the vulnerability but the exploit.py file is incomplete and non-functional.
Target:
Spring Framework (5.3.0 to 5.3.17, 5.2.0 to 5.2.19) with Apache Tomcat (below 10.0.20, 9.0.62, 8.5.78)
No auth needed
Prerequisites:
Target application running a vulnerable version of Spring Framework and Tomcat · Java JDK 9 or later
nomisec
WORKING POC
1 stars
by clemoregan · remote
https://github.com/clemoregan/SSE4-CVE-2022-22965
This repository contains a functional PoC for CVE-2022-22965, a Spring Boot vulnerability allowing remote code execution via data binding manipulation. The exploit leverages Tomcat's configuration to deploy a malicious JSP shell.
Classification
Working Poc 95%
Target:
Spring Boot 2.6.5 with Tomcat
No auth needed
Prerequisites:
Docker environment · Vulnerable Spring Boot application (2.6.5)
nomisec
WORKING POC
1 stars
by c4mx · poc
https://github.com/c4mx/CVE-2022-22965_PoC
This repository contains a Spring Boot application demonstrating CVE-2022-22965, a Spring Framework RCE vulnerability. The PoC leverages the vulnerable data binding mechanism in Spring MVC to achieve remote code execution.
Classification
Working Poc 90%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
A vulnerable Spring Framework application exposed to the internet · Ability to send crafted HTTP requests to the target
nomisec
WRITEUP
1 stars
by Snip3R69 · poc
https://github.com/Snip3R69/spring-shell-vuln
This repository contains a detailed writeup about CVE-2022-22965 (Spring4Shell), including vulnerability details, exploitation conditions, and mitigation steps. It does not include actual exploit code but provides technical context and references.
Classification
Writeup 90%
Target:
Spring Framework (JDK 9+)
No auth needed
Prerequisites:
Spring MVC endpoint with DataBinder enabled · JDK 9 or higher · Servlet container like Apache Tomcat
nomisec
WORKING POC
1 stars
by daniel0x00 · poc
https://github.com/daniel0x00/Invoke-CVE-2022-22965-SafeCheck
This PowerShell script is a port of the original Python PoC for CVE-2022-22965, a Spring Framework RCE vulnerability. It attempts to inject a file on the target server and checks if the file was successfully created, confirming vulnerability.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Target server running vulnerable Spring Framework version · Network access to the target server
nomisec
WRITEUP
1 stars
by helsecert · poc
https://github.com/helsecert/CVE-2022-22965
This repository provides a detailed writeup and detection scripts for CVE-2022-22965, a critical RCE vulnerability in Spring Framework. It includes PowerShell and Bash scripts to identify vulnerable systems by searching for specific files and classes associated with the vulnerability.
Classification
Writeup 100%
Target:
Spring Framework versions before 5.3.18 and 5.2.20
No auth needed
Prerequisites:
Spring Framework usage · JDK9 or later · Specific vulnerable methods and parameters in use
nomisec
WORKING POC
1 stars
by Joe1sn · poc
https://github.com/Joe1sn/CVE-2022-22965
This repository contains a proof-of-concept for CVE-2022-22965, a Spring4Shell vulnerability. It includes a controller and a bean class to demonstrate the exploitation of the vulnerability in a Spring MVC environment.
Classification
Working Poc 90%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
A vulnerable Spring Framework application · Network access to the target application
nomisec
WORKING POC
1 stars
by lcarea · poc
https://github.com/lcarea/CVE-2022-22965
This is a Python-based PoC for CVE-2022-22965, a Spring Core RCE vulnerability. It attempts to write a JSP shell to a target system by exploiting the vulnerability and verifies success by checking the response status code.
Classification
Working Poc 95%
Target:
Spring Framework (Spring Core)
No auth needed
Prerequisites:
Target URL list in a text file · Network access to the target · Vulnerable Spring Framework version
nomisec
WORKING POC
by glory903-devsecops · poc
https://github.com/glory903-devsecops/CVE-2022-22965
This repository contains a functional exploit for CVE-2022-22965 (Spring4Shell), demonstrating remote code execution via Spring Framework's data binding mechanism. The exploit automates the attack process, including payload delivery, web shell deployment, and post-exploitation verification.
Classification
Working Poc 95%
Target:
Spring Framework (5.3.0-5.3.17, 5.2.0-5.2.19) with JDK 9+
No auth needed
Prerequisites:
Spring Framework with vulnerable versions · JDK 9 or higher · Apache Tomcat as the servlet container
nomisec
WORKING POC
by 0xBlackash · poc
https://github.com/0xBlackash/CVE-2022-22965
The repository contains a functional Python exploit for CVE-2022-22965 (Spring4Shell), which achieves RCE by manipulating Spring's data binding mechanism to write a JSP webshell to disk. The exploit sends crafted HTTP parameters to modify Tomcat configuration and execute arbitrary commands.
Classification
Working Poc 95%
Target:
Spring Framework (5.3.0–5.3.17, 5.2.0–5.2.19) on Apache Tomcat with Java 9+
No auth needed
Prerequisites:
Java 9+ · Spring Framework 5.3.0–5.3.17 or 5.2.0–5.2.19 · Deployed as WAR on Apache Tomcat · Data binding enabled
nomisec
WORKING POC
by 0xAshwesker · poc
https://github.com/0xAshwesker/CVE-2022-22965
This repository contains a functional exploit for CVE-2022-22965 (Spring4Shell), demonstrating remote code execution via crafted HTTP parameters to manipulate Spring's data binding mechanism and write a JSP webshell to disk.
Classification
Working Poc 95%
Target:
Spring Framework (5.3.0-5.3.17, 5.2.0-5.2.19) on Apache Tomcat with Java 9+
No auth needed
Prerequisites:
Java 9+ · Spring Framework 5.3.0-5.3.17 or 5.2.0-5.2.19 · Deployed as WAR file · Apache Tomcat · Data binding enabled
nomisec
WORKING POC
by zaryouhashraf · poc
https://github.com/zaryouhashraf/CVE-2022-22965
This repository contains a functional exploit for CVE-2022-22965 (Spring4Shell), demonstrating remote code execution via crafted HTTP parameters targeting Spring MVC data binding on Tomcat. The PoC includes a Python script that automates the exploitation process and provides an interactive shell upon successful compromise.
Classification
Working Poc 100%
Target:
Spring Framework (5.3.0-5.3.17, 5.2.0-5.2.19) on Apache Tomcat with Java 9+
No auth needed
Prerequisites:
Java 9+ · Spring Framework 5.3.0-5.3.17 or 5.2.0-5.2.19 · Deployed as WAR on Apache Tomcat · Data binding enabled for request parameters
gitlab
WORKING POC
by pokoyo.bughunter · poc
https://gitlab.com/pokoyo.bughunter/spring4shell-vulnerability-poc-app
This repository contains a functional exploit for CVE-2022-22965 (Spring4Shell), demonstrating remote code execution (RCE) via a crafted HTTP request that manipulates Tomcat's logging configuration to deploy a JSP webshell. The exploit includes a Dockerized vulnerable Spring application and a Python script to trigger the vulnerability.
Classification
Working Poc 100%
Target:
Spring Framework (with Tomcat)
No auth needed
Prerequisites:
Docker · Python3 with requests library · vulnerable Spring/Tomcat setup
gitlab
WORKING POC
by milo2012 · remote
https://gitlab.com/milo2012/cve-2022-22965
This repository contains a functional exploit for CVE-2022-22965, a Spring Core RCE vulnerability. The Python script manipulates log configurations to write a JSP webshell, demonstrating arbitrary code execution on vulnerable Spring applications running on Tomcat.
Classification
Working Poc 95%
Target:
Spring Framework 5.3.0 to 5.3.16 on Tomcat
No auth needed
Prerequisites:
Spring application running on Tomcat · Network access to the target
gitlab
WORKING POC
by pausersg · poc
https://gitlab.com/pausersg/Spring4Shell-POC
This repository contains a functional exploit for CVE-2022-22965 (Spring4Shell), demonstrating remote code execution via log file manipulation in a vulnerable Spring application. The exploit writes a JSP webshell to the target server, allowing arbitrary command execution.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Docker · Python3 with requests library · Vulnerable Spring application running on Tomcat
nomisec
WORKING POC
by aditidutta696-dev · poc
https://github.com/aditidutta696-dev/Spring4Shell-CVE-2022-22965-Exploitation-Attempt
This repository contains a proof-of-concept for detecting and mitigating CVE-2022-22965 (Spring4Shell) exploitation attempts. It includes a firewall server that blocks requests containing the exploit signature and a test requester to simulate attacks.
Classification
Working Poc 90%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Access to a vulnerable Spring Framework application · Ability to send crafted HTTP requests
nomisec
WORKING POC
by suyash-R-K · poc
https://github.com/suyash-R-K/dfir-malware-investigation
This repository contains a comprehensive DFIR project simulating the Spring4Shell (CVE-2022-22965) vulnerability, including an exploit simulator, detection engine, and firewall mitigation. It demonstrates the full incident response lifecycle with network and memory forensics methodologies.
Classification
Working Poc 90%
Target:
Spring Framework (vulnerable versions)
No auth needed
Prerequisites:
Vulnerable Spring application · Network access to target
nomisec
WRITEUP
by Shakur1314 · poc
https://github.com/Shakur1314/CVE-2022-22965-Spring4Shell-Security-Operations-Analysis
This repository is a detailed writeup and analysis of CVE-2022-22965 (Spring4Shell), focusing on incident response, threat detection, and mitigation strategies. It includes firewall log analysis, attack characteristics, and proposed firewall rules for mitigation.
Classification
Writeup 100%
Target:
Spring Framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19, and older versions
No auth needed
Prerequisites:
Access to a vulnerable Spring Framework application · Ability to send crafted HTTP POST requests
nomisec
WORKING POC
by nhattanhh · remote
https://github.com/nhattanhh/CVE-2022-22965
This is a functional exploit for CVE-2022-22965 (Spring4Shell), which leverages a remote code execution vulnerability in Spring Framework by manipulating log configurations to write a malicious JSP file to the target server. The exploit then allows command execution via HTTP requests to the deployed JSP shell.
Classification
Working Poc 95%
Target:
Spring Framework < 5.2.20 and 5.3.18
No auth needed
Prerequisites:
JDK 9 or higher · Apache Tomcat as servlet container · WAR packaging · Dependencies: spring-webmvc or spring-webflux
nomisec
WORKING POC
by dbwlsdnr95 · poc
https://github.com/dbwlsdnr95/CVE-2022-22965
This repository contains a functional PoC for CVE-2022-22965 (Spring4Shell), demonstrating how an attacker can exploit the DataBinder vulnerability in Spring Framework to manipulate Tomcat's AccessLogValve and upload a webshell. The PoC includes a vulnerable Spring Boot application and a controller that allows parameter binding to a POJO, enabling the exploitation of the classLoader access issue.
Classification
Working Poc 95%
Target:
Spring Framework 5.3.17 (Spring Boot 2.6.5)
No auth needed
Prerequisites:
Tomcat server with WAR deployment · JDK 9 or higher · Spring Framework 5.3.17 or vulnerable versions
nomisec
WORKING POC
by xenosf · remote
https://github.com/xenosf/CS4239-Spring4Shell-POC
This repository contains a functional proof-of-concept exploit for CVE-2022-22965 (Spring4Shell), demonstrating remote code execution via log file manipulation in vulnerable Spring Boot applications. It includes a Python exploit script and a dockerized demo environment with vulnerable and patched versions of Spring Boot.
Classification
Working Poc 95%
Target:
Spring Boot 2.6.3 (with Spring Framework 5.3.15) on Tomcat 9.0.56
No auth needed
Prerequisites:
Vulnerable Spring Boot application with exposed endpoint · Access to the target URL
nomisec
WORKING POC
by NickoPS87 · poc
https://github.com/NickoPS87/Spring4Shell-Python-Firewall-POC
This repository contains a Python-based firewall PoC designed to detect and block exploit attempts for CVE-2022-22965 (Spring4Shell) by inspecting POST requests for the malicious payload pattern 'class.module.classLoader'. It includes a test script to simulate malicious requests and verify blocking behavior.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Vulnerable Spring Framework application exposed to HTTP POST requests
nomisec
STUB
by shoucheng3 · poc
https://github.com/shoucheng3/spring-projects__spring-framework_CVE-2022-22965_5-2-19-RELEASE
This repository appears to be a partial or incomplete snapshot of the Spring Framework source code, specifically around the time of CVE-2022-22965. It lacks exploit code or a proof-of-concept, containing only build scripts, integration tests, and documentation.
Target:
Spring Framework 5.2.19.RELEASE
No auth needed
Prerequisites:
Access to vulnerable Spring Framework instance
github
WRITEUP
by OscarYR · poc
https://github.com/OscarYR/CVE_Reproduction/tree/main/Spring4Shell/CVE-2022-22965.md
This repository provides a detailed technical analysis of CVE-2022-22965 (Spring4Shell), including root cause analysis, exploit mechanics, and step-by-step reproduction instructions. It does not contain functional exploit code but offers in-depth explanations of the vulnerability.
Classification
Writeup 100%
Target:
Spring Framework (versions 5.3.0 – 5.3.17 and 5.2.0 – 5.2.19)
No auth needed
Prerequisites:
Tomcat deployment · JDK 9 or later · Spring MVC or Spring WebFlux
nomisec
WORKING POC
by Nosie12 · poc
https://github.com/Nosie12/fire-wall-server
This repository provides a Python-based firewall script to detect and block malicious requests exploiting CVE-2022-22965 (Spring4Shell). It uses pattern matching to identify and block known exploit payloads.
Classification
Working Poc 90%
Target:
Spring Core Framework
No auth needed
Prerequisites:
A vulnerable Spring Core Framework instance
nomisec
WORKING POC
by osungjinwoo · remote
https://github.com/osungjinwoo/CVE-2022-22965
This repository contains a functional proof-of-concept exploit for CVE-2022-22965 (Spring4Shell), a remote code execution vulnerability in Spring Framework. The exploit leverages malicious JSP file uploads to achieve RCE on vulnerable Spring applications.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Vulnerable Spring application exposed · Network access to target
nomisec
WRITEUP
by brunoh6 · poc
https://github.com/brunoh6/web-threat-mitigation
This repository documents a lab setup for detecting and mitigating web application threats, specifically focusing on CVE-2022-22965 (Spring4Shell). It includes deployment of vulnerable applications, scanning with OWASP ZAP and Burp Suite, and WAF setup with ModSecurity and OWASP CRS.
Classification
Writeup 100%
Target:
Spring Framework (Spring4Shell vulnerability)
No auth needed
Prerequisites:
Docker · OWASP ZAP · Burp Suite · ModSecurity · OWASP CRS · Metasploit Framework
nomisec
WORKING POC
by jashan-lefty · poc
https://github.com/jashan-lefty/Spring4Shell
This repository contains a functional proof-of-concept for CVE-2022-22965 (Spring4Shell), including a firewall handler to block malicious requests and a test script to demonstrate the exploit. The test script sends crafted POST requests with payloads designed to trigger remote code execution via the Spring Framework vulnerability.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Vulnerable Spring Framework application exposed · Network access to the target
nomisec
WORKING POC
by Aur3ns · poc
https://github.com/Aur3ns/Block-Spring4Shell
This repository contains a Python-based firewall server designed to detect and block exploit attempts for CVE-2022-22965 (Spring4Shell). It includes a test script to simulate attacks and verify the blocking rules.
Classification
Working Poc 90%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
A vulnerable Spring Framework application · Network access to the target
nomisec
WORKING POC
by guigui237 · poc
https://github.com/guigui237/Expoitation-de-la-vuln-rabilit-CVE-2022-22965
This repository contains a Python-based exploit for CVE-2022-22965 (Spring4Shell), which leverages a remote code execution vulnerability in the Spring Core Java framework. The exploit modifies Tomcat logging parameters to inject a JSP webshell, allowing command execution on vulnerable systems.
Classification
Working Poc 95%
Target:
Spring Core Java Framework (versions before 5.3.18 and 5.2.20)
No auth needed
Prerequisites:
Target running Spring MVC or Spring WebFlux with JDK >= 9 · Accessible Tomcat logging configuration · Python dependencies: requests, BeautifulSoup
nomisec
WORKING POC
by LucasPDiniz · remote
https://github.com/LucasPDiniz/CVE-2022-22965
This repository contains a functional proof-of-concept exploit for CVE-2022-22965 (Spring4Shell), which leverages Spring Core's parameter binding to write a malicious JSP file to a vulnerable Tomcat server, enabling remote code execution.
Classification
Working Poc 95%
Target:
Spring Framework (5.3.0-17, 5.2.0-19) with Tomcat and JDK >= 9
No auth needed
Prerequisites:
Spring Core < 5.3.18 or < 5.2.20 · JDK >= 9 · Apache Tomcat as WAR deployment · spring-webmvc or spring-webflux dependency
nomisec
WORKING POC
by xsxtw · remote
https://github.com/xsxtw/SpringFramework_CVE-2022-22965_RCE
This repository contains a functional exploit for CVE-2022-22965, a remote code execution vulnerability in Spring Framework. The exploit leverages a malicious JSP file upload and execution via a crafted HTTP request to achieve RCE.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Spring Framework · Target must be accessible via HTTP
nomisec
WORKING POC
by ESSAFAR · poc
https://github.com/ESSAFAR/Firewall-Rules
This is a Python-based firewall server designed to block requests matching specific patterns associated with CVE-2022-22965, a Spring Framework RCE vulnerability. It checks for malicious paths and headers, responding with a 403 Forbidden if detected.
Classification
Working Poc 90%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Network access to the target server · Target server running a vulnerable version of Spring Framework
nomisec
WORKING POC
by sohamsharma966 · remote
https://github.com/sohamsharma966/Spring4Shell-CVE-2022-22965
This is a functional exploit for CVE-2022-22965 (Spring4Shell), which achieves remote code execution by uploading a JSP webshell to a vulnerable Spring application running on Apache Tomcat. The exploit leverages unsafe deserialization and path traversal to deploy a password-protected shell.
Classification
Working Poc 95%
Target:
Spring Framework (versions <5.2.20, 5.3.0-17) with Apache Tomcat
No auth needed
Prerequisites:
JDK 9+ · Apache Tomcat as servlet container · Spring WebMVC/WebFlux dependency · WAR deployment
nomisec
WORKING POC
by dbgee · remote
https://github.com/dbgee/Spring4Shell
This repository contains a functional PoC for CVE-2022-22965 (Spring4Shell), which exploits a remote code execution vulnerability in Spring Core. The exploit manipulates Tomcat's logging configuration to write a JSP webshell, allowing arbitrary command execution via crafted HTTP requests.
Classification
Working Poc 95%
Target:
Spring Framework (Spring Core) with JDK 9+ and Tomcat
No auth needed
Prerequisites:
Target must be running a vulnerable version of Spring Framework with Tomcat and JDK 9+
nomisec
WORKING POC
by c33dd · remote
https://github.com/c33dd/CVE-2022-22965
This PoC exploits CVE-2022-22965 (Spring4Shell) by sending a malicious HTTP POST request to inject a JSP webshell into a vulnerable Spring Core application. It then verifies exploitation by checking if the webshell is accessible via a GET request.
Classification
Working Poc 95%
Target:
Spring Framework (versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19, and older unsupported versions)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Spring Framework · Target must be exposed to the attacker's network requests
nomisec
WORKING POC
by ajith737 · remote
https://github.com/ajith737/Spring4Shell-CVE-2022-22965-POC
This is a functional exploit for CVE-2022-22965 (Spring4Shell), which achieves remote code execution by uploading a JSP webshell to a vulnerable Spring Core application. The exploit leverages class loader manipulation and runtime command execution via crafted HTTP headers and payloads.
Classification
Working Poc 95%
Target:
Spring Core (Spring Framework) versions vulnerable to CVE-2022-22965
No auth needed
Prerequisites:
Vulnerable Spring Core application exposed to the internet · Access to the target URL
nomisec
WORKING POC
by devengpk · remote
https://github.com/devengpk/CVE-2022-22965
This repository contains a functional PoC exploit for CVE-2022-22965 (Spring4Shell), demonstrating RCE via log file manipulation in Spring Core applications running on Tomcat. The exploit writes a JSP webshell to the target server, allowing command execution via HTTP requests.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Docker for building the vulnerable environment · Python3 with requests library · Target application running Spring Framework with vulnerable configuration
nomisec
WRITEUP
by Enokiy · poc
https://github.com/Enokiy/spring-RCE-CVE-2022-22965
This repository contains a detailed writeup and proof-of-concept code for CVE-2022-22965, a Spring MVC/WebFlux RCE vulnerability on JDK 9+ via data binding. It includes Java Bean API analysis, Introspector/BeanInfo/PropertyDescriptor usage, and a demo controller to illustrate the vulnerability.
Classification
Writeup 90%
Target:
Spring MVC or Spring WebFlux on JDK 9+ (Tomcat WAR deployment)
No auth needed
Prerequisites:
Application running on JDK 9+ · Deployed as WAR on Tomcat
nomisec
STUB
by snicoll-scratches · poc
https://github.com/snicoll-scratches/spring-boot-cve-2022-22965
This repository contains basic Spring Boot application templates for Gradle and Maven builds, but lacks any exploit code or demonstration of CVE-2022-22965. It appears to be a skeleton project rather than a functional PoC.
Target:
Spring Boot 2.4.x
No auth needed
Prerequisites:
Spring Boot 2.4.x environment
nomisec
WORKING POC
by Omaraitbenhaddi · remote
https://github.com/Omaraitbenhaddi/-Spring4Shell-CVE-2022-22965-
This is a functional exploit for CVE-2022-22965 (Spring4Shell), which leverages a remote code execution vulnerability in Spring Core. The exploit uploads a JSP shell to a vulnerable server by manipulating the class module and pipeline properties.
Classification
Working Poc 95%
Target:
Spring Framework (versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19, and older unsupported versions)
No auth needed
Prerequisites:
Vulnerable Spring Framework version · Access to the target URL
nomisec
WORKING POC
by te5t321 · poc
https://github.com/te5t321/Spring4Shell-CVE-2022-22965.py
This is a Python script that exploits CVE-2022-22965 (Spring4Shell) by manipulating the logging configuration to create arbitrary log files on the target system. It checks for vulnerability by attempting to write a log file and then verifying its existence via HTTP requests.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Spring Framework · Target must have the vulnerable endpoint exposed
nomisec
STUB
by fransvanbuul · poc
https://github.com/fransvanbuul/CVE-2022-22965-susceptibility
This repository contains only a basic Spring Boot application stub without any exploit code or vulnerability demonstration. It does not include a PoC for CVE-2022-22965.
Target:
Spring Framework (unspecified version)
No auth needed
nomisec
WORKING POC
by t3amj3ff · poc
https://github.com/t3amj3ff/Spring4ShellPoC
This is a functional exploit for CVE-2022-22965 (Spring4Shell), which achieves remote code execution by uploading a malicious JSP file to a vulnerable Spring Core application. The exploit leverages the vulnerability in the Spring Framework's data binding mechanism to write a webshell to the target server.
Classification
Working Poc 95%
Target:
Spring Framework (versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19, and older unsupported versions)
No auth needed
Prerequisites:
Target must be running a vulnerable version of the Spring Framework · Target must be exposed to the internet or accessible to the attacker · Java runtime environment on the target
nomisec
WORKING POC
by luoqianlin · poc
https://github.com/luoqianlin/CVE-2022-22965
This repository contains a functional exploit for CVE-2022-22965, a Spring Framework RCE vulnerability. The Python script manipulates the AccessLogValve configuration to write a malicious JSP file, enabling remote code execution.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Spring Framework · Access to the target URL
nomisec
WORKING POC
by 0xr1l3s · poc
https://github.com/0xr1l3s/CVE-2022-22965
This is a Python-based exploit for CVE-2022-22965 (Spring4Shell), which achieves remote code execution by uploading a malicious JSP file to a vulnerable Spring Framework application. The exploit leverages a deserialization vulnerability to write a web shell to the target server.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Vulnerable Spring Framework application exposed · Network access to the target
nomisec
WORKING POC
by mwojterski · poc
https://github.com/mwojterski/cve-2022-22965
This PoC demonstrates CVE-2022-22965, a Spring Framework vulnerability allowing remote code execution via manipulation of Tomcat's access logger. The exploit reconfigures the logger to write a JSP file containing arbitrary Java code, which is then executed by the server.
Classification
Working Poc 100%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Exposed Spring application with vulnerable WebDataBinder configuration · Java 9+ environment due to Class::getModule() usage
nomisec
SCANNER
by mebibite · poc
https://github.com/mebibite/springhound
This repository contains a Bash script designed to scan directories for JAR files and analyze their Manifest files to detect Spring Framework occurrences. It does not exploit CVE-2022-22965 but aids in identifying potentially vulnerable Spring Framework versions.
Classification
Scanner 100%
Target:
Spring Framework
No auth needed
Prerequisites:
Access to the target system's file system
vulncheck_xdb
WORKING POC
remote
https://github.com/AabyssZG/SpringBoot-Scan
This repository contains a comprehensive Spring Boot vulnerability scanning and exploitation tool, including support for CVE-2022-22965 (Spring Core RCE). It features modules for detecting sensitive endpoints, exploiting known vulnerabilities, and integrating with asset discovery platforms like FOFA, Hunter, and ZoomEye.
Classification
Working Poc | Scanner 95%
Attack Type
Rce | Info Leak | Deserialization
Target:
Spring Boot, Spring Cloud, Spring Framework
No auth needed
Prerequisites:
target URL or list of URLs · optional API keys for asset discovery platforms
vulncheck_xdb
WORKING POC
remote
https://github.com/W01fh4cker/Serein
This repository contains a collection of exploit scripts for various CVEs, including CVE-2022-22965. The scripts are functional and demonstrate the vulnerabilities they target.
Classification
Working Poc 95%
Target:
Spring Cloud Gateway
No auth needed
Prerequisites:
Python 3.7-3.9 · target server running vulnerable software
vulncheck_xdb
SCANNER
remote
https://github.com/tangxiaofeng7/CVE-2022-22965-Spring-CachedintrospectionResults-Rce
The repository contains a Go-based scanner for detecting CVE-2022-22965, a Spring Core RCE vulnerability. It sends crafted HTTP requests to check for vulnerability indicators but does not include exploit code for achieving RCE.
Classification
Scanner 90%
Target:
Spring Core (JDK9+)
No auth needed
Prerequisites:
Target running Spring Core with JDK9+ · Access to the target URL
vulncheck_xdb
WORKING POC
remote
https://github.com/cybersecurityworks553/spring4shell-exploit
This repository contains a functional exploit for CVE-2022-22965 (Spring4Shell), which deploys a JSP web shell on vulnerable Spring Framework applications. The exploit leverages the vulnerability to achieve remote code execution (RCE) by manipulating class loader properties.
Classification
Working Poc 95%
Target:
Spring Framework (versions before 5.3.18 and 5.2.20)
No auth needed
Prerequisites:
Vulnerable Spring Framework application · Network access to the target
vulncheck_xdb
WORKING POC
remote
https://github.com/jbaines-r7/spring4shell_vulnapp
This repository provides a Dockerized intentionally vulnerable Spring Framework application (CVE-2022-22965) with a functional exploit PoC. The exploit leverages the Spring4Shell vulnerability to achieve remote code execution (RCE) via a crafted HTTP request.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Tomcat 8.5.77 · OpenJDK 11 · Maven for building the WAR file
vulncheck_xdb
WORKING POC
remote
https://github.com/ckkok/spring4shell-poc
This repository contains a functional exploit for CVE-2022-22965 (Spring4Shell), demonstrating remote code execution via crafted HTTP requests to a vulnerable Spring application. The exploit writes a JSP shell to the target server, allowing command execution.
Classification
Working Poc 95%
Target:
Spring Framework (Spring Core) with JDK 9+, Apache Tomcat
No auth needed
Prerequisites:
Vulnerable Spring application deployed on Tomcat · Network access to the target · JDK 9+ environment
vulncheck_xdb
WORKING POC
remote
https://github.com/VAnD4L/spring4shell
This repository contains a functional exploit for CVE-2022-22965 (Spring4Shell), which achieves remote code execution (RCE) by leveraging a vulnerability in the Spring Framework. The exploit crafts a malicious HTTP request to deploy a JSP webshell, allowing arbitrary command execution on the target system.
Classification
Working Poc 95%
Target:
Spring Framework (versions affected by CVE-2022-22965)
No auth needed
Prerequisites:
Target running a vulnerable version of Spring Framework · Network access to the target application
vulncheck_xdb
WORKING POC
remote
https://github.com/craig/SpringCore0day
This repository contains a functional exploit for CVE-2022-22965 (Spring Core RCE), leveraging a crafted HTTP request to achieve remote code execution via JSP shell deployment. The exploit targets Spring Framework applications running on JDK 9+.
Classification
Working Poc 95%
Target:
Spring Framework (JDK 9+)
No auth needed
Prerequisites:
Spring Framework application with vulnerable configuration · JDK 9 or higher · Network access to the target
vulncheck_xdb
WORKING POC
remote
https://github.com/hktalent/spring-spel-0day-poc
This repository contains a functional exploit PoC for CVE-2022-22965, demonstrating RCE in Spring Cloud Function via SpEL injection. The exploit leverages the `spring.cloud.function.routing-expression` header to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Spring Cloud Function (v3.1.6 and earlier)
No auth needed
Prerequisites:
Spring Cloud Function application with exposed endpoints
metasploit
WORKING POC
MANUAL
rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/spring_framework_rce_spring4shell.rb
This Metasploit module exploits CVE-2022-22965 (Spring4Shell), a remote code execution vulnerability in Spring Framework due to unsafe data binding in class property manipulation. It crafts a malicious request to modify the Tomcat ClassLoader, writes a JSP payload to the server, and achieves RCE.
Classification
Working Poc 95%
Target:
Spring Framework 5.3.0-5.3.17, 5.2.0-5.2.19 (on JDK 9+ with Tomcat)
No auth needed
Prerequisites:
Target running vulnerable Spring Framework version · Tomcat as standalone container · JDK 9 or higher