Known Exploited Vulnerability
9.8
CRITICAL
CVE-2022-22963
VMware Tanzu Spring Cloud Function Remote Code Exe - [Actively Exploited]
Description

In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.

INFO

Published Date :

April 1, 2022, 11:15 p.m.

Last Modified :

June 28, 2024, 2:08 p.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

3.9
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

When using routing functionality in VMware Tanzu's Spring Cloud Function, it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.

Required Action :

Apply updates per vendor instructions.

Notes :

https://tanzu.vmware.com/security/cve-2022-22963

Public PoC/Exploit Available at Github

CVE-2022-22963 has a 129 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2022-22963 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Oracle communications_cloud_native_core_network_slice_selection_function
2 Oracle communications_cloud_native_core_network_repository_function
3 Oracle mysql_enterprise_monitor
4 Oracle communications_cloud_native_core_unified_data_repository
5 Oracle retail_xstore_point_of_service
6 Oracle communications_cloud_native_core_policy
7 Oracle banking_virtual_account_management
8 Oracle sd-wan_edge
9 Oracle banking_corporate_lending_process_management
10 Oracle banking_credit_facilities_process_management
11 Oracle banking_supply_chain_finance
12 Oracle communications_cloud_native_core_automated_test_suite
13 Oracle financial_services_analytical_applications_infrastructure
14 Oracle communications_cloud_native_core_network_function_cloud_native_environment
15 Oracle communications_cloud_native_core_console
16 Oracle communications_cloud_native_core_security_edge_protection_proxy
17 Oracle financial_services_behavior_detection_platform
18 Oracle financial_services_enterprise_case_management
19 Oracle banking_liquidity_management
20 Oracle communications_cloud_native_core_network_exposure_function
21 Oracle banking_trade_finance_process_management
22 Oracle product_lifecycle_analytics
23 Oracle communications_communications_policy_management
24 Oracle banking_cash_management
25 Oracle banking_branch
26 Oracle banking_electronic_data_exchange_for_corporates
27 Oracle banking_origination
1 Vmware spring_cloud_function
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2022-22963.

URL Resource
http://packetstormsecurity.com/files/173430/Spring-Cloud-3.2.2-Remote-Command-Execution.html Exploit Third Party Advisory VDB Entry
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005 Third Party Advisory
https://tanzu.vmware.com/security/cve-2022-22963 Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2022.html Patch Third Party Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Updated: 5 days, 19 hours ago
0 stars 2 fork 2 watcher
Born at : Nov. 17, 2024, 11:53 a.m. This repo has been linked 414 different CVEs too.

This repository is designed to provide a comprehensive collection of study materials, notes, and resources for the Offensive Security Certified Professional (OSCP) exam. It covers all key topics from basic to advanced, helping aspiring penetration testers to prepare efficiently for the exam.

cybersecurity hacking oscp oscp-guide oscp-journey oscp-prep

Updated: 1 month, 2 weeks ago
1 stars 0 fork 0 watcher
Born at : Oct. 4, 2024, 4:43 p.m. This repo has been linked 75 different CVEs too.

None

Python C Shell PHP PowerShell ASP.NET

Updated: 1 month, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Oct. 1, 2024, 2:21 p.m. This repo has been linked 66 different CVEs too.

一款针对spring漏洞检测的图形化工具

Python

Updated: 2 months, 2 weeks ago
1 stars 0 fork 0 watcher
Born at : Aug. 10, 2024, 11:22 a.m. This repo has been linked 5 different CVEs too.

红队武器库漏洞利用工具合集整理

HTML

Updated: 2 months, 2 weeks ago
188 stars 30 fork 30 watcher
Born at : June 27, 2024, 9:28 a.m. This repo has been linked 54 different CVEs too.

None

Python C++ C# HTML

Updated: 6 months ago
0 stars 0 fork 0 watcher
Born at : May 17, 2024, 8:24 a.m. This repo has been linked 9 different CVEs too.

None

Shell

Updated: 3 months, 3 weeks ago
0 stars 1 fork 1 watcher
Born at : May 8, 2024, 4:25 a.m. This repo has been linked 1 different CVEs too.

SpringbootGuiExploit漏洞利用工具测试版

Java

Updated: 3 months ago
22 stars 0 fork 0 watcher
Born at : May 7, 2024, 2:47 a.m. This repo has been linked 3 different CVEs too.

OSCP and stuffs

Updated: 3 months ago
1 stars 0 fork 0 watcher
Born at : April 19, 2024, 8:18 p.m. This repo has been linked 63 different CVEs too.

None

Python C Shell

Updated: 4 months, 1 week ago
1 stars 0 fork 0 watcher
Born at : March 29, 2024, 5:29 a.m. This repo has been linked 62 different CVEs too.

All CVE - PoC in GitHub

poc proofofconcept tester allcve cvegithub cvenew cvepoc cveupdate

Updated: 2 months, 3 weeks ago
5 stars 2 fork 2 watcher
Born at : March 22, 2024, 3:58 p.m. This repo has been linked 928 different CVEs too.

None

Updated: 8 months, 1 week ago
1 stars 0 fork 0 watcher
Born at : March 11, 2024, 1:21 p.m. This repo has been linked 930 different CVEs too.

针对SpringBoot的渗透工具,Spring漏洞利用工具

Go

Updated: 2 months, 2 weeks ago
307 stars 20 fork 20 watcher
Born at : March 7, 2024, 4:52 p.m. This repo has been linked 5 different CVEs too.

OffSec Certified Professional Certification (OSCP).

oscp oscp-cheatsheet oscp-guide oscp-journey oscp-prep oscp-tools offsec-certified-professional-certification offensive-security offensivesecurity awesome-list awesome-lists cheatsheet offensive-ops

Updated: 8 months, 2 weeks ago
1 stars 0 fork 0 watcher
Born at : March 5, 2024, 9:21 a.m. This repo has been linked 61 different CVEs too.

Oscp-notes

Updated: 3 months ago
1 stars 0 fork 0 watcher
Born at : March 3, 2024, 5:12 a.m. This repo has been linked 61 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-22963 vulnerability anywhere in the article.

  • 360 Netlab Blog - Network Security Research Lab at 360
公有云网络安全威胁情报(202204)

概述 本文聚焦于云上重点资产的扫描攻击、云服务器总体攻击情况分析、热门漏洞及恶意程序的攻击威胁。 360高级威胁狩猎蜜罐系统发现全球9.2万个云服务器IP进行网络扫描、漏洞攻击、传播恶意软件等行为。其中包括国内39家单位所属的云服务资产IP,这些单位涉及政府、医疗、建筑、军工等多个行业。 2022年4月,WSO2多个产品和Apache Struts2爆出高危漏洞,两个漏洞技术细节已经公开,并且我们 ... Read more

Published Date: May 11, 2022 (2 years, 6 months ago)
  • 360 Netlab Blog - Network Security Research Lab at 360
公有云网络安全威胁情报(202203)

概述本文聚焦于云上重点资产的扫描攻击、云服务器总体攻击情况分析、热门漏洞及恶意程序的攻击威胁。360高级威胁狩猎蜜罐系统发现全球12万个云服务器IP,进行网络扫描、漏洞攻击、传播恶意软件等行为。其中包括国内156家单位的服务器IP,涉及大型央企、政府机关等行业。Spring厂商连续公开3个关键漏洞,CVE-2022-22947、CVE-2022-22963、CVE-2022-22965,本文将对前 ... Read more

Published Date: Apr 19, 2022 (2 years, 7 months ago)
  • 360 Netlab Blog - Network Security Research Lab at 360
Fodcha, a new DDos botnet

OverviewRecently, CNCERT and 360netlab worked together and discovered a rapidly spreading DDoS botnet on the Internet. The global infection looks fairly big as just in China there are more than 10,000 ... Read more

Published Date: Apr 13, 2022 (2 years, 7 months ago)

The following table lists the changes that have been made to the CVE-2022-22963 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Modified Analysis by [email protected]

    Jun. 28, 2024

    Action Type Old Value New Value
    Changed Reference Type http://packetstormsecurity.com/files/173430/Spring-Cloud-3.2.2-Remote-Command-Execution.html No Types Assigned http://packetstormsecurity.com/files/173430/Spring-Cloud-3.2.2-Remote-Command-Execution.html Exploit, Third Party Advisory, VDB Entry
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Jul. 13, 2023

    Action Type Old Value New Value
    Added Reference http://packetstormsecurity.com/files/173430/Spring-Cloud-3.2.2-Remote-Command-Execution.html [No Types Assigned]
  • Reanalysis by [email protected]

    Jul. 13, 2023

    Action Type Old Value New Value
    Removed CWE NIST CWE-94
    Added CWE NIST CWE-917
  • Modified Analysis by [email protected]

    Jul. 28, 2022

    Action Type Old Value New Value
    Changed Reference Type https://www.oracle.com/security-alerts/cpuapr2022.html No Types Assigned https://www.oracle.com/security-alerts/cpuapr2022.html Patch, Third Party Advisory
    Changed Reference Type https://www.oracle.com/security-alerts/cpujul2022.html No Types Assigned https://www.oracle.com/security-alerts/cpujul2022.html Patch, Third Party Advisory
    Added CPE Configuration OR *cpe:2.3:a:oracle:banking_branch:14.5:*:*:*:*:*:*:* *cpe:2.3:a:oracle:banking_cash_management:14.5:*:*:*:*:*:*:* *cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5:*:*:*:*:*:*:* *cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5:*:*:*:*:*:*:* *cpe:2.3:a:oracle:banking_electronic_data_exchange_for_corporates:14.5:*:*:*:*:*:*:* *cpe:2.3:a:oracle:banking_liquidity_management:14.2:*:*:*:*:*:*:* *cpe:2.3:a:oracle:banking_liquidity_management:14.5:*:*:*:*:*:*:* *cpe:2.3:a:oracle:banking_origination:14.5:*:*:*:*:*:*:* *cpe:2.3:a:oracle:banking_supply_chain_finance:14.5:*:*:*:*:*:*:* *cpe:2.3:a:oracle:banking_trade_finance_process_management:14.5:*:*:*:*:*:*:* *cpe:2.3:a:oracle:banking_virtual_account_management:14.5:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.1.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.2:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.3:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_communications_policy_management:12.6.0.0.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.1.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.2.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.1.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.1.1:*:*:*:*:*:*:* *cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.1.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.1.1:*:*:*:*:*:*:* *cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* versions up to (including) 8.0.29 *cpe:2.3:a:oracle:product_lifecycle_analytics:3.6.1.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:retail_xstore_point_of_service:20.0.1:*:*:*:*:*:*:* *cpe:2.3:a:oracle:retail_xstore_point_of_service:21.0.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:sd-wan_edge:9.0:*:*:*:*:*:*:* *cpe:2.3:a:oracle:sd-wan_edge:9.1:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Jul. 25, 2022

    Action Type Old Value New Value
    Added Reference https://www.oracle.com/security-alerts/cpujul2022.html [No Types Assigned]
  • CVE Modified by [email protected]

    Apr. 20, 2022

    Action Type Old Value New Value
    Added Reference https://www.oracle.com/security-alerts/cpuapr2022.html [No Types Assigned]
  • Initial Analysis by [email protected]

    Apr. 06, 2022

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005 No Types Assigned https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005 Third Party Advisory
    Changed Reference Type https://tanzu.vmware.com/security/cve-2022-22963 No Types Assigned https://tanzu.vmware.com/security/cve-2022-22963 Vendor Advisory
    Changed Reference Type https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH No Types Assigned https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH Third Party Advisory
    Added CWE NIST CWE-94
    Added CPE Configuration OR *cpe:2.3:a:vmware:spring_cloud_function:*:*:*:*:*:*:*:* versions up to (including) 3.1.6 *cpe:2.3:a:vmware:spring_cloud_function:*:*:*:*:*:*:*:* versions from (including) 3.2.0 up to (including) 3.2.2
  • CVE Modified by [email protected]

    Apr. 02, 2022

    Action Type Old Value New Value
    Added Reference https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005 [No Types Assigned]
  • CVE Modified by [email protected]

    Apr. 02, 2022

    Action Type Old Value New Value
    Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH [No Types Assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-22963 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-22963 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

97.49 }} 0.02%

score

0.99982

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability