10
CVSSv3

CVE-2022-22947

Published: 03/03/2022 Updated: 28/10/2022
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 10 | Impact Score: 6 | Exploitability Score: 3.9
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

In spring cloud gateway versions before 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware spring cloud gateway 3.1.0

vmware spring cloud gateway

oracle commerce guided search 11.3.2

oracle communications cloud native core network slice selection function 1.8.0

oracle communications cloud native core network slice selection function 22.1.0

oracle communications cloud native core network repository function 1.15.0

oracle communications cloud native core network function cloud native environment 1.10.0

oracle communications cloud native core network exposure function 22.1.0

oracle communications cloud native core service communication proxy 1.15.0

oracle communications cloud native core network repository function 1.15.1

oracle communications cloud native core binding support function 1.11.0

oracle communications cloud native core binding support function 22.1.3

oracle communications cloud native core network repository function 22.2.0

oracle communications cloud native core security edge protection proxy 22.1.1

oracle communications cloud native core console 22.2.0

oracle communications cloud native core network repository function 22.1.2

Mailing Lists

This Metasploit module exploits an unauthenticated remote code execution vulnerability in Spring Cloud Gateway versions 300 through 306 and 310 The vulnerability can be exploited when the Gateway Actuator endpoint is enabled, exposed and unsecured An unauthenticated attacker can use SpEL expressions to execute code and take control of the v ...
Spring Cloud Gateway version 310 suffers from a remote code execution vulnerability ...

Github Repositories

Spring Cloud Gateway < 307 & < 311 Code Injection (RCE) CVE: CVE-2022-22947 CVSS: 100 (Vmware - tanzuvmwarecom/security/cve-2022-22947) Applications using Spring Cloud Gateway are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured A remote attacker could make a maliciously crafted requ

Copied from Original: githubcom/whwlsfb/cve-2022-22947-godzilla-memshell githubcom/lucksec/Spring-Cloud-Gateway-CVE-2022-22947

Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947) Build $ git clone githubcom/twseptian/cve-2022-22947git $ cd cve-2022-22947 $ docker build -t cve-2022-22947 $ docker run -p 9000:9000 --name cve-2022-22947 cve-2022-22947 PoC send the following request to add a router which contains an SpEL expression (i

Spring Cloud Gateway < 307 & < 311 Code Injection (RCE) CVE: CVE-2022-22947 CVSS: 100 (Vmware - tanzuvmwarecom/security/cve-2022-22947) Applications using Spring Cloud Gateway are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured A remote attacker could make a maliciously crafted requ

Spring Gateway Demo This repo is intended to accompany the blog posts here: wyapl/2021/12/20/bring-your-own-ssrf-the-gateway-actuator/ and wyapl/2022/02/26/cve-2022-22947-spel-casting-and-evil-beans/ The Gateway actuator allows for administrators of the application to define new routes and manipulate existing ones This repo provides a basic Spring applicatio

CVE-2022-22947-RCE CVE-2022-22947 RCE Spring Cloud Gateway provides a library for building an API Gateway on top of Spring WebFlux Applications using Spring Cloud Gateway in the version prior to 310 and 306, are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured A remote attacker could make a maliciously crafted requ

一、Spring Cloud Gateway远程代码执行漏洞 危害等级:高危 POC/EXP情况:已公开 CNVD编号:CNNVD-2022-16402 ​ CVE编号:CVE-2022-22947 二、影响范围: VMWare Spring Cloud GateWay 310 VMWare Spring Cloud GateWay >=300,<=306 VMWare Spring Cloud GateWay <300 三、漏洞描述 Spring Cloud Gateway存在远程代

CVE-2022-22947 memshell ###此脚本不完善,仅作学习用途,请勿非法使用 基于 c0ny1 大佬的博客做的学习脚本,可写入netty和spring内存马 测试环境为 vulhub eg:xxpy 127001:8080 netty whoami

springcloudRCE Spring Cloud Gateway RCE - CVE-2022-22947

Spring-Cloud-Gateway(CVE-2022-22947) Spring Cloud Gateway远程代码执行漏洞 python3 spring_rcepy url cmd

cve-2022-22947 poc for cve-2022-22947 usage: python python cve-2022-22947py url cmd

Burp_VulPscan burp被动扫描插件,目前只有CVE-2022-22947

CVE-2022-22947 Spring Cloud Gateway Actuator API SpEL表达式注入命令执行(CVE-2022-22947) 注入哥斯拉内存马 默认key pass base64 注:代码没有清除路由部分自行清除下。。 测试环境:githubcom/vulhub/vulhub/blob/master/spring/CVE-2022-22947/READMEzh-cnmd 内存马class githubcom/whwlsfb/cve-2022-22947-godzilla-memshell

spring-cve-2022-22947 Spring cloud gateway code injection : CVE-2022-22947

CVE-2022-22947 内存马注入 支持注入三类内存马 Usage: usage -t <type> -u <url> Options: -h, --help show this help message and exit -t TYPE switch one : spring, netty, godzilla -u URL url 以哥斯拉马注入为例 python3 -t godzilla -u 127001

Spring-Cloud-Gateway(CVE-2022-22947) Spring Cloud Gateway远程代码执行漏洞 python3 spring_rcepy url cmd 有缓存,多执行几次。

CVE-2022-22947-Spring-Cloud-Gateway-SpelRCE

cve-2022-22947

CVE-2022-22947-exp 复现了一下CVE-2022-22947漏洞,写了漏洞利用的exp 后面根据大佬的文章写了内存马注入的exp,仅供参考

CVE-2022-22947-POC Spring Cloud Gateway 远程代码执行漏洞 Spring_Cloud_Gateway_RCE_POC-CVE-2022-22947

mullet 扫描器 梭鱼 支持主动 被动扫描的方式 被动通过 mitm 支持 所以需要安装证书 安装证书 代理开启后访问 mitmit/ poc是跟指纹关联的 指纹匹配了才会发对应的poc 采用统一请求的方式 限流 所有发的请求都会被限流 内部多个插件使用多生产多消费的模式 安装 仅支持python3的环境 git

CVE-2022-22947 Spring Cloud Gateway是Spring中的一个API网关。其310及306版本(包含)以前存在一处SpEL表达式注入漏洞,当攻击者可以访问Actuator API的情况下,将可以利用该漏洞执行任意命令。 漏洞环境 git clone githubcom/vulhub/vulhub/blob/master/spring/CVE-2022-22947/docker-composeyml docker-compose up -d

bappstore BurpSuitePro拓展 被动扫描 (shiro)githubcom/pmiaowu/BurpShiroPassiveScan (SpringSpiderScan)githubcom/EASY233/BpScan (Sprin CVE-2022-22947)githubcom/zhizhuoshuma/Burp_VulPscan (log4jScan)githubcom/pmiaowu/log4j2Scan (FastJsonScan)githubcom/pmiaowu/BurpFastJsonScan (log4j2)githubcom/f0ng/log4j2burpscanner https

Spring Cloud Gateway < 307 & < 311 Code Injection (RCE) CVE: CVE-2022-22947 CVSS: 100 (Vmware - tanzuvmwarecom/security/cve-2022-22947) Applications using Spring Cloud Gateway are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured A remote attacker could make a maliciously crafted requ

Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947) Build $ git clone githubcom/twseptian/cve-2022-22947git $ cd cve-2022-22947 $ docker build -t cve-2022-22947 $ docker run -p 9000:9000 --name cve-2022-22947 cve-2022-22947 PoC send the following request to add a router which contains an SpEL expression (i

一、Spring Cloud Gateway远程代码执行漏洞 危害等级:高危 POC/EXP情况:已公开 CNVD编号:CNNVD-2022-16402 ​ CVE编号:CVE-2022-22947 二、影响范围: VMWare Spring Cloud GateWay 310 VMWare Spring Cloud GateWay >=300,<=306 VMWare Spring Cloud GateWay <300 三、漏洞描述 Spring Cloud Gateway存在远程代

一、Spring Cloud Gateway远程代码执行漏洞 危害等级:高危 POC/EXP情况:已公开 CNVD编号:CNNVD-2022-16402 ​ CVE编号:CVE-2022-22947 二、影响范围: VMWare Spring Cloud GateWay 310 VMWare Spring Cloud GateWay >=300,<=306 VMWare Spring Cloud GateWay <300 三、漏洞描述 Spring Cloud Gateway存在远程代

CVE-2022-22947 In spring cloud gateway versions prior to 311+ and 307+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host authentication complexity vector NONE MEDIUM NET

VULOnceMore 漏洞复现是安全学习的基础 服务器中间件 Java Apace Shiro FastJson Log4j2 Spring CVE-2022-22947 Spring Cloud Gateway Actuator API SpEL 代码注入 WebLogic PHP Python [ ]

CVE-2022-22947-goby 日常更新一些顺手写的gobypoc,包含高危害EXP goby CVE_2022_22947json

cve-2022-22947 poc for cve-2022-22947 usage: python python cve-2022-22947py url cmd

CVE-2022-22947 SpringCloudGatewayRCE Code By:Jun_sheng @橘子网络安全实验室 橘子网络安全实验室 0rangeteam/ 0x00 风险概述 本工具仅限授权安全测试使用,禁止未授权非法攻击站点 在线阅读《中华人民共和国网络安全法》 0x01 工具使用 运行中提示 0x02 Bug问题 Bug请提交Issues,有时间会看的。

CVE-2022-22947 运行: CVE-2022-22947exe ip 命令 影响版本: Spring Cloud Gateway < 311 Spring Cloud Gateway < 307 Spring Cloud Gateway 其他已不再更新的版本

CVE-2022-22947 godzilla-memshell CVE-2022-22947 注入哥斯拉内存马

CVE-2022-2294 Heap buffer overflow in WebRTC in Google Chrome prior to 10305060114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page authentication complexity vector not available not available not available confidentiality integrity availability not available not available not available CVSS Score: not available Re

CVE-2022-22947-POC CVE-2022-22947 reproduce

CVE-2022-22947 Spring-Cloud-Spel-RCE

CVE-2022-22947 poc for CVE-2022-22947

CVE-2022-22947-exp 复现了一下CVE-2022-22947漏洞,写了漏洞利用的exp 后面根据大佬的文章写了内存马注入的exp,仅供参考

Spring Cloud Gateway Actuator API SpEL表达式注入命令执行(CVE-2022-22947) 1installation pip3 install -r requirementstxt 2Usage $ python3 spring-cloud-gateway-rcepy -h ___ __ ____ ___ ____ ____ ____ ____ ___ _ _ _____ / __\ /\ /\ /__\ |___ \ / _ \ |___ \ |___ \

CVE-2022-22947_Rce_Exp Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947

CVE-2022-22947-POC CVE-2022-22947批量检测脚本,回显命令没进行正则,大佬们先用着,后续再更 将脚本路径下放上urltxt 直接执行python 脚本py 演示: 检测完成之后会生成一个成功的txt 该脚本会将代码进行注入,刷新路由,回显命令,删除注入命令,大佬们勿喷,有什么bug明天解决

Spring-Cloud-GateWay-CVE-2022-22947-demon-code 调试代码包含断点信息,直接导入即可进行调试

CVE-2022-22947 CVE-2022-22947_EXP,CVE-2022-22947_RCE Usage 反弹shell python3 CVE-2022-22947py 目标网址 弹shell的IP 端口 执行命令 python3 CVE-2022-22947py 目标网址 命令

CVE-2022-22947 Usage: python3 CVE-2022-22947py url

CVE-2022-22947 Spring Cloud Gateway远程代码执行

CVE-2022-22947-exp CVE-2022-22947 Exploit script Use python3 CVE-2022-22947py -h

Spring Cloud Gateway RCE Env CVE-2022-22947 CVE-2022-22947 was identified in the Spring Cloud Gateway Server jar After the application is compiled you should be able to view the existing routes by visiting: 127001:9000/actuator/gateway/routes Compile $ mvn package -DskipTests Run $ java -jar target/spring-gateway-rce-001

cve-2022-22947 cve-2022-22947

CVE-2022-22947 >> script for exploit Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947) githubcom/march0s1as/CVE-2022-22947 cd CVE-2022-22947 go build springgo /spring -h

CVE-2022-22947 Spring Cloud Gateway Actuator API SpEL表达式注入命令执行(CVE-2022-22947) 移步漏洞复现 Goto vulnerability reproduce

-cve-2022-22947- cve-2022-22947 spring cloud gateway 批量扫描脚本

CVE-2022-22947-Rce_POC 批量url检测Spring-Cloud-Gateway-CVE-2022-22947 使用方法 py Spring-Cloud-Gatewaypy UrlsPath

CVE-2022-22947 Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947) Use: -t vuldomaincom -f urlstxt -c command

afrog 一款基于 YAML 语法模板的定制化快速漏洞扫描器一只快乐的青蛙! 用法 afrog -h 这将显示 afrog 的帮助,以下是所有支持的命令 NAME: afrog 是一款基于 YAML 语法模板的定制化快速漏洞扫描器 - USAGE: afrog [命令] VERSION: 106 COMMANDS: help, h Shows a list o

Spring-Cloud-Gateway-CVE-2022-22947- Spring Cloud Gateway远程代码执行漏洞的安全公告。该漏洞为当Spring Cloud Gateway启用和暴露 Gateway Actuator 端点时,使用 Spring Cloud Gateway 的应用程序可受到代码注入攻击。攻击者可以发送特制的恶意请求,从而远程执行任意代码。 【受影响版本】 Spring Cloud Gateway &l

springboot-actuator-routingExpression-rce Spring Cloud Function SPEL injection with the help of actuator It is clearly like as the Spring Cloud Gateway rce(CVE-2022-22947)As we can request env endpoint of Spring boot actuator just like this below: The first step is to revalue the springcloudfunctionroutingExpression so that it produces an evil SPEL POST /actuator/env HT

springboot-actuator-routingExpression-rce Spring Cloud Function SPEL injection with the help of actuator It is clearly like as the Spring Cloud Gateway rce(CVE-2022-22947)As we can request env endpoint of Spring boot actuator just like this below: The first step is to revalue the springcloudfunctionroutingExpression so that it produces an evil SPEL POST /actuator/env HT

Spring-Cloud-Gateway-CVE-2022-22947 Spring-Cloud-Gateway-CVE-2022-22947

CVE-2022-22947 Spring-CVE-2022-22947

Java-Sec-Learn Java安全学习 Log4j-Vuln:Log4j漏洞环境 Java-Des-Learn:Java反序列化学习 JNDI-Bypass:JNDI高版本JDK绕过 GMemShell:Spring Cloud Gateway(CVE-2022-22947)注入哥斯拉内存马

SpringWebflux-MemShell SpringWebflux通用内存马 WARNING:项目代码仅用于安全研究,禁止用于发起非法攻击,造成的后果使用者自负。 详见关联文章:从CVE-2022-22947到Spring WebFlux内存马与哥斯拉

CVE-2022-22947-POC 批量检测Spring Cloud Gateway 远程代码执行漏洞 使用方法 示范

一、工具概述 日常渗透过程中,经常会碰到Spring Boot搭建的微服务,于是就想做一个针对Spring Boot的开源渗透框架,主要用作扫描Spring Boot的敏感信息泄露端点,并可以直接测试Spring的相关高危漏洞。 于是,就写了这么一个工具:SpringBoot-Scan 【简称:“SB-Scan”(错乱】 后期将加入

该文件夹集成自写的POC 下列是POC列表 一周保底更新一个POC脚本 PS:有些POC网上暂未公布[-],只分享在个人知识星球 微信群会做日常的交流分享 1[+]泛微OA_V9版本的SQL代码执行漏洞 2[-]泛微OA_V9全版本前台任意文件上传漏洞 3[+]Spring-Cloud-Function-SpEL_POC_EXP 4[+]CVE-2022-22965 5[+]CVE-2022-22947 6[+]

SpringBoot-Scan-GUI by 13exp Windows: python SpringBoot-Scan-GUIpy 直接执行release文件夹内exe程序 Linux: python3 SpringBoot-Scan-GUI-Linuxpy wine SpringBoot-Scan-GUIexe Win使用效果图 CVE-2022-22965 vulhub 内置shell aabysszg-shell 13exp-shell 春秋云境 内置shell 13exp-shell aabysszg-shell CVE-2022-22963 vulhub 春秋云境 CVE-2022-22947 vu

fscan-POC 强化fscan的漏扫POC库 声明:该POC仅供于学习跟安全检测使用,如果违法&恶意操作,与本人无关 一、使用说明: 将fscan项目拉取到本地,然后找到路径\fscan\WebScan\pocs\,将该项目的yml文件放入该路径重新打包fscan即可食用 fscan项目地址:githubcom/shadow1ng/fscan 二、更新: 2

cve_learning_record record all my cve learning notes spring-RCE-CVE-2022-22965 spring-cloud-gateway-CVE-2022-22947 fastjson反序列化漏洞分析 others CTF: java 哈希碰撞&QLExpression

本笔录采用Docsify + Github Pages + DNS加速构建 除了域名,斥巨资,其他的均为白嫖 所以在笔录首页最前面还是给他们冠个名 社交网站 本笔记汇集了其他网站的文章 本笔录源码在github上面(码云的要实名认证) 简书 码云 Github 笔录目录(暂时还没有整理完) 设计模式

SpringScan Burp 检测插件 支持检测漏洞 Spring Core RCE (CVE-2022-22965) Spring Cloud Function SpEL RCE (CVE-2022-22963) Spring Cloud GateWay SPEL RCE (CVE-2022-22947) 回连平台 Dnglog BurpCollaboratorClient Ceye 支持自定义回连平台 CVE-2022-22965 检测方法 无损检测,主要通过下面两种方式检测: 报错检测 回连检测(Dnglo

Awesome lists about all things related to Spring-shell ##Spring Project [official Spring project post] [official Spring project post] ##Cloudflare WAF mitigations for Spring4Shell ##MITRE CVE CVE-2022-22947 - [official VMware post] CVE-2022-22950 - [official VMware post] CVE-2022-22963 - [official Spring project post] CVE-2022-22965 - [official Spring project pos

声明:禁止一些违法操作,如有违法操作与本人无关!!! 欢迎关注chaosec公众号!!! 汇总平时写的一些主流&非主流的漏洞POC&EXP,有需要自取 更新: [+] add CNVD-2021-30167-NC-BeanShell-RCE [+] add CNVD-2021-49104_upload [+] add CVE-2021-22005poc [+] add CVE-2022-22947-POC [+] add CVE-2022-22954-VMware-RCE [+] add

CVE-2021-42013 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2450 was insufficient An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can suc

靶场记录 By Whoopsunix 不定时更新在研究漏洞时搭的环境 WIKI中有配套复现、分析文章 已有环境 Fastjson 截止80 Spring Security CVE-2022-22978 Spring Security认证绕过 MongoDB CVE-2022-22980 Spring Data MongoDB SpEL表达式注入 Shiro CVE-2022-32532 Apache Shiro RegExPatternMatcher Spring Cloud CVE-2022-22947 Spring Cloud Gatew

yak-module-zh yak的poc、exp库,根据vulhub中的漏洞进行调试和编辑。 POC CVE-2021-28169 CVE-2021-34429 CVE-2022-22890 CVE-2022-22965 CVE-2022-28346 EXP CVE-2022-22890 CVE-2022-22965 CVE-2022-22947 Spring Cloud Function SPEL表达式注入 Struts2: CVE-2021-31805 --EXP CVE-2021-31805 --POC CVE-2017-9791 --EXP

vulEnv Lists laravel CVE-2021-3129 shiro CVE-2016-4437 CVE-2020-13933 spring CVE-2022-22947 CVE-2022-22963 CVE-2022-22965

fscan-POC 强化fscan的漏扫POC库 声明:该POC仅供于学习跟安全检测使用,如果违法&恶意操作,与本人无关!!!欢迎关注chaosec公众号 如果有师傅想加的漏洞POC可以公众号或者项目评论告诉我 一、使用说明: 将fscan项目拉取到本地,然后找到路径\fscan\WebScan\pocs\,将该项目的yml文件放

vulBox 漏洞收集 20211116 add CVE-2020-27986_SonarQube_api_未授权访问漏洞检测脚本 20211120 add Apache Druid任意文件读取漏洞(CVE-2021-36749) 20211203 add CVE-2021-43778 GLPI 路径遍历漏洞 20211211 add log4j2 jndi 任意代码执行漏洞 20211231 add CVE-2021-43798 grafana任意文件读取漏洞 2022126 add CVE-2021-4034 Linux Polkit 权

FrameVul FrameVul 综合 钉钉 泛微OA 致远OA Apache APISIX Apache Druid Apache Kylin Coremail Discuz Exchange FastJson Fckeditor Flask Gitlab Jboss Jenkins Log4j MeterSphere Oracle Access Manager Outlook Shiro Spring Struts2 Thinkphp TP-Link Vmware Weblogic Zabbix 综合 主流供应商的一些攻击性漏洞汇总 2021_Hvv漏洞 2022年Java应用程序的CVE漏洞

Dynatrace AppSec Powerup Automated Security Reporting Utility for for Dynatrace Security Features Built with log4j in mind, the remediator provides the ability to: Tag CVE's within a tenant Manage CVE's in the form of Management Zones, Dashboards Build Reports on CVE's across Environments With the CVE tagger auto_tag and CVE configuratior push_configs users can

pocsuite3 (268个) 更新于 2022-12-03 05:07:10 更新记录 文件名称 收录时间 CVE-2021-21975py 2022-12-03 05:07:10 CVE-2021-46422py 2022-12-03 05:07:10 D-Linkpy 2022-12-03 05:07:10 hikvision-2013-4976_web_login-bypasspy 2022-12-03 05:07:10 lanhaipy 2022-12-03 05:07:10 CVE-2022-26134py 2022-12-03 05:07:10 rce_佑友防火墙py 2022-12-03 05:07

JavaVulnMap Java漏洞导图,用于梳理自己的java安全知识栈 应用层 OWASP Top 10 2021-Broken Access Control 2021-Cryptographic Failures 2021-Injection 2021-Insecure Design 2021-Security Misconfiguration 2021-Vulnerable and Outdated Components 2021-Identification and Authentication Failures 2021-Software and Data Integrity Failures 2021-Security Logging and Moni

Vulhub-Reproduce 【免责声明】本仓库所涉及的技术、思路和工具仅供安全技术研究,任何人不得将其用于非授权渗透测试,不得将其用于非法用途和盈利,否则后果自行承担。 Vulhub漏洞复现,不定时更新。感谢@Vulhub提供开源漏洞靶场。 0x01 项目导航 Adobe ColdFusion 反序列化漏洞 CVE-2017-3066 Ado

Penetration_Testing_POC 搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。 请注意所有工具是否有后门或者其他异常行为,建议均在虚拟环境操作。 Penetration_Testing_POC 请善用搜索[Ctrl+F]查找 IOT Device&Mobile Phone Web APP 提权辅助相关 PC tools-小工具集

Penetration_Testing_POC 搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。 Penetration_Testing_POC 请善用搜索[Ctrl+F]查找 IOT Device&Mobile Phone Web APP 提权辅助相关 PC tools-小工具集合 文章/书籍/教程相关 说明 请善用搜索[Ctrl+F]查找 IOT Device&Mobile

TOP all Top Top Top_Codeql TOP All bugbounty pentesting CVE-2022- POC Exp Things Table of Contents 2022 year top total 30 2021 year top total 30 2020 year top total 30 2019 year top total 30 2018 year top total 30 2017 year top total 30 2016 year top total 30 2015 year top total 30 2014 year top total 30 2013 year top total 30 2022 star name url des 961 CVE-2022-0847-

TOP all Top Top Top_Codeql TOP All bugbounty pentesting CVE-2022- POC Exp Things Table of Contents 2022 year top total 30 2021 year top total 30 2020 year top total 30 2019 year top total 30 2018 year top total 30 2017 year top total 30 2016 year top total 30 2015 year top total 30 2014 year top total 30 2013 year top total 30 2022 star name url des 975 CVE-2022-0847-

TOP all Top Top Top_Codeql TOP All bugbounty pentesting CVE-2022- POC Exp Things Table of Contents 2022 year top total 30 2021 year top total 30 2020 year top total 30 2019 year top total 30 2018 year top total 30 2017 year top total 30 2016 year top total 30 2015 year top total 30 2014 year top total 30 2013 year top total 30 2022 star name url des 988 CVE-2022-0847-

Table of Contents 2023 year top total 30 2022 year top total 30 2021 year top total 30 2020 year top total 30 2019 year top total 30 2018 year top total 30 2017 year top total 30 2016 year top total 30 2015 year top total 30 2014 year top total 30 2023 star updated_at name url des 304 2023-03-18T21:10:14Z Windows_LPE_AFD_CVE-2023-21768 githubcom/chompie1337/Wi

Table of Contents 2023 year top total 30 2022 year top total 30 2021 year top total 30 2020 year top total 30 2019 year top total 30 2018 year top total 30 2017 year top total 30 2016 year top total 30 2015 year top total 30 2014 year top total 30 2023 star updated_at name url des 323 2023-03-23T01:27:35Z Windows_LPE_AFD_CVE-2023-21768 githubcom/chompie1337/Wi

PoC in GitHub 2022 CVE-2022-0185 (2022-02-11) A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a f

Table of Contents 2023 year top total 30 2022 year top total 30 2021 year top total 30 2020 year top total 30 2019 year top total 30 2018 year top total 30 2017 year top total 30 2016 year top total 30 2015 year top total 30 2014 year top total 30 2013 year top total 30 2012 year top total 30 2011 year top total 30 2010 year top total 30 2009 year top total 30 2008 year top to

PoC in GitHub 2022 CVE-2022-0185 (2022-02-11) A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a f

PoC in GitHub 2022 CVE-2022-0185 (2022-02-11) A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a f

Recent Articles

IT threat evolution in Q1 2022. Non-mobile statistics
Securelist • AMR • 27 May 2022

IT threat evolution in Q1 2022
IT threat evolution in Q1 2022. Non-mobile statistics
IT threat evolution in Q1 2022. Mobile statistics

These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data.
Quarterly figures
According to Kaspersky Security Network, in Q1 2022:

Kaspersky solutions blocked 1,216,350,437 attacks from online resources across the globe.
...

Sysrv-K Botnet Targets Windows, Linux
Threatpost • Sagar Tiwari • 17 May 2022

Unpatched vulnerabilities in the Spring Framework and WordPress plugins are being exploited by cybercriminals behind the Sysrv botnet to target Linux and Windows systems. The goal, according to researchers, is to infect systems with cryptomining malware.
The botnet variant is being called Sysrv-K by Microsoft Security Intelligence researchers that posted a thread on Twitter revealing details of the botnet variant.
Researchers said criminals behind Sysrv-K have programmed their bot ar...

CISA warns admins to patch actively exploited VMware, Zyxel bugs
BleepingComputer • Sergiu Gatlan • 17 May 2022

The Cybersecurity and Infrastructure Security Agency (CISA) has added two more vulnerabilities to its list of actively exploited bugs, a code injection bug in the Spring Cloud Gateway library and a command injection flaw in Zyxel firmware for business firewalls and VPN devices.
The Spring Framework vulnerability (CVE-2022-22947) is a maximum severity weakness that attackers can abuse to gain remote code execution on unpatched hosts.
This critical bug is currently being 
&n...

CISA warns admins to patch actively exploited Spring, Zyxel bugs
BleepingComputer • Sergiu Gatlan • 17 May 2022

The Cybersecurity and Infrastructure Security Agency (CISA) has added two more vulnerabilities to its list of actively exploited bugs, a code injection bug in the Spring Cloud Gateway library and a command injection flaw in Zyxel firmware for business firewalls and VPN devices.
The Spring Framework vulnerability (CVE-2022-22947) is a maximum severity weakness that attackers can abuse to gain remote code execution on unpatched hosts.
This critical bug is currently being 
&n...

Microsoft: Sysrv botnet targets Windows, Linux servers with new exploits
BleepingComputer • Sergiu Gatlan • 13 May 2022

Microsoft says the Sysrv botnet is now exploiting vulnerabilities in the Spring Framework and WordPress to ensnare and deploy cryptomining malware on vulnerable Windows and Linux servers.
Redmond discovered a new variant (tracked as Sysrv-K) that has been upgraded with more capabilities, including scanning for unpatched WordPress and Spring deployments.
"The new variant, which we call Sysrv-K, sports additional exploits and can gain control of web servers" by exploitin...

SpringShell attacks target about one in six vulnerable orgs
BleepingComputer • Bill Toulas • 05 Apr 2022

Roughly one out of six organizations worldwide that are impacted by the Spring4Shell zero-day vulnerability have already been targeted by threat actors, according to statistics from one cybersecurity company.
The exploitation attempts took place in the first four days since the disclosure of the severe remote code execution (RCE) flaw, tracked as CVE-2022-22965, and the associated exploit code.
According to Check Point, who compiled the report based on their telemetry data, 37,000 Sp...

Monero-mining botnet targets Windows, Linux web servers
The Register • Jeff Burt • 01 Jan 1970

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Sysrv-K malware infects unpatched tin, Microsoft warns

The latest variant of the Sysrv botnet malware is menacing Windows and Linux systems with an expanded list of vulnerabilities to exploit, according to Microsoft.
The strain, which Microsoft's Security Intelligence team calls Sysrv-K, scans the internet for web servers that have security holes, such as path traversal, remote file disclosure, and arbitrary file download bugs, that can be exploited to infect the machines.
The vulnerabilities, all of which have patches available, include...