## https://sploitus.com/exploit?id=860EB47D-41AB-5856-9471-C34D579A29EF
# CVE-2022-25845-In-Spring

> [!IMPORTANT]
> 仅供学习交流,请勿用于非法用途
exploit by python
如有帮助,点个star
参考:
https://github.com/luelueking/CVE-2022-25845-In-Spring
# Usage
根据需要自行修改传参逻辑,这里是默认POST的请求体传参
```bash
git clone https://github.com/ph0ebus/CVE-2022-25845-In-Spring.git
cd CVE-2022-25845-In-Spring
python3 exp.py http://127.0.0.1:8080/json
```
```
usage: exp.py [-h] url
positional arguments:
url the url of the target server
options:
-h, --help show this help message and exit
```
# Demo

## Star History
[](https://star-history.com/#ph0ebus/CVE-2022-25845-In-Spring&Date)