## https://sploitus.com/exploit?id=7D874F81-FBEE-512F-B206-D7CED2BA80B0
# Exploit-for-CVE-2022-22963
Exploit using curl to get a reverse shell in vulnerable spring cloud environments.
This exploit abuses the functionRouter URI, by injecting code into the `eval` function of the Spring Framework through a post request with a header that gives us Remote Code Execution (RCE).
<p align="center">
<img src="images/2023-06-29_01-30.png" width="650" title="Terminal print">
</p>
### Created by
[Henri Vlasic](https://github.com/HenriVlasic)
- [Linkedin](https://www.linkedin.com/in/henri-vlasic/)
[Arthur Valverde](https://github.com/arthurvmbl)
- [Linkedin](https://www.linkedin.com/in/uartuo/)