Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2022-22954

Description

VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. A malicious actor with network access can trigger a server-side template injection that may result in remote code execution.

POC

Reference

- http://packetstormsecurity.com/files/166935/VMware-Workspace-ONE-Access-Template-Injection-Command-Execution.html

Github

- https://github.com/0day404/vulnerability-poc

- https://github.com/0x783kb/Security-operation-book

- https://github.com/0xPugal/One-Liners

- https://github.com/0xPugazh/One-Liners

- https://github.com/0xfoysal/Tools

- https://github.com/0xlittleboy/One-Liner-Scripts

- https://github.com/0xlittleboy/One-Liners

- https://github.com/1SeaMy/CVE-2022-22954

- https://github.com/20142995/Goby

- https://github.com/20142995/nuclei-templates

- https://github.com/20142995/sectool

- https://github.com/24-2021/EXP-POC

- https://github.com/24-2021/fscan-POC

- https://github.com/3SsFuck/CVE-2021-31805-POC

- https://github.com/3SsFuck/CVE-2022-22954-POC

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ARPSyndicate/kenzer-templates

- https://github.com/ArrestX/--POC

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/Chocapikk/CVE-2022-22954

- https://github.com/DrorDvash/CVE-2022-22954_VMware_PoC

- https://github.com/GhostTroops/TOP

- https://github.com/HACK-THE-WORLD/DailyMorningReading

- https://github.com/HimmelAward/Goby_POC

- https://github.com/JERRY123S/all-poc

- https://github.com/Jhonsonwannaa/CVE-2022-22954

- https://github.com/JordanANDJohn/CVE-2021-31805-POC

- https://github.com/Jun-5heng/CVE-2022-22954

- https://github.com/KayCHENvip/vulnerability-poc

- https://github.com/MLX15/CVE-2022-22954

- https://github.com/MSeymenD/CVE-2022-22954-Testi

- https://github.com/Miraitowa70/POC-Notes

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/NaInSec/CVE-PoC-in-GitHub

- https://github.com/NyxAzrael/Goby_POC

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/SYRTI/POC_to_review

- https://github.com/Schira4396/VcenterKiller

- https://github.com/StarCrossPortal/scalpel

- https://github.com/Threekiii/Awesome-POC

- https://github.com/UGF0aWVudF9aZXJv/VMWare-Pentesting

- https://github.com/Vulnmachines/VMWare_CVE-2022-22954

- https://github.com/W01fh4cker/Serein

- https://github.com/W01fh4cker/VcenterKit

- https://github.com/WhooAmii/POC_to_review

- https://github.com/XiaomingX/awesome-poc-for-red-team

- https://github.com/Z0fhack/Goby_POC

- https://github.com/amit-pathak009/CVE-2022-22954

- https://github.com/amit-pathak009/CVE-2022-22954-PoC

- https://github.com/aniqfakhrul/CVE-2022-22954

- https://github.com/anonymous364872/Rapier_Tool

- https://github.com/apif-review/APIF_tool_2024

- https://github.com/apit-review-account/apit-tool

- https://github.com/arzuozkan/CVE-2022-22954

- https://github.com/astraztech/vmware4shell

- https://github.com/avboy1337/CVE-2022-22954-VMware-RCE

- https://github.com/axingde/CVE-2022-22954-POC

- https://github.com/b1ank1108/awesome-stars

- https://github.com/b4dboy17/CVE-2022-22954

- https://github.com/badboy-sft/CVE-2022-22954

- https://github.com/bb33bb/CVE-2022-22954-VMware-RCE

- https://github.com/bewhale/CVE-2022-22954

- https://github.com/bhavesh-pardhi/One-Liner

- https://github.com/bigblackhat/oFx

- https://github.com/binganao/vulns-2022

- https://github.com/chaosec2021/CVE-2022-22954-VMware-RCE

- https://github.com/chaosec2021/EXP-POC

- https://github.com/chaosec2021/fscan-POC

- https://github.com/cisagov/Malcolm

- https://github.com/corelight/cve-2022-22954

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/czz1233/fscan

- https://github.com/d4n-sec/d4n-sec.github.io

- https://github.com/djytmdj/Tool_Summary

- https://github.com/emilyastranova/VMware-CVE-2022-22954-Command-Injector

- https://github.com/fatguru/dorks

- https://github.com/fleabane1/CVE-2021-31805-POC

- https://github.com/gd-discov3r/bugbounty

- https://github.com/goldenscale/GS_GithubMirror

- https://github.com/hktalent/Scan4all_Pro

- https://github.com/hktalent/TOP

- https://github.com/jax7sec/CVE-2022-22954

- https://github.com/jbmihoub/all-poc

- https://github.com/k0mi-tg/CVE-POC

- https://github.com/kaanymz/2022-04-06-critical-vmware-fix

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/lit1numyt/docker-pentest_victim

- https://github.com/litt1eb0yy/One-Liner-Scripts

- https://github.com/lolminerxmrig/CVE-2022-22954_

- https://github.com/lucksec/VMware-CVE-2022-22954

- https://github.com/mamba-2021/EXP-POC

- https://github.com/mamba-2021/fscan-POC

- https://github.com/manas3c/CVE-POC

- https://github.com/merlinepedra/AttackWebFrameworkTools-5.0

- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0

- https://github.com/mhurts/CVE-2022-22954-POC

- https://github.com/mumu2020629/-CVE-2022-22954-scanner

- https://github.com/mustafaakalin/bugbounty

- https://github.com/nguyenv1nK/CVE-2022-22954

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/onewinner/VulToolsKit

- https://github.com/orwagodfather/CVE-2022-22954

- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main

- https://github.com/peiqiF4ck/WebFrameworkTools-5.5

- https://github.com/peiqiF4ck/WebFrameworkTools-5.5-enhance

- https://github.com/rat857/AtomsPanic

- https://github.com/secfb/CVE-2022-22954

- https://github.com/shengshengli/AttackWebFrameworkTools-5.0

- https://github.com/shengshengli/fscan-POC

- https://github.com/sherlocksecurity/VMware-CVE-2022-22954

- https://github.com/taielab/awesome-hacking-lists

- https://github.com/tanjiti/sec_profile

- https://github.com/trhacknon/CVE-2022-22954

- https://github.com/trhacknon/CVE-2022-22954-PoC

- https://github.com/trhacknon/One-Liners

- https://github.com/trhacknon/Pocingit

- https://github.com/tunelko/CVE-2022-22954-PoC

- https://github.com/tyleraharrison/VMware-CVE-2022-22954-Command-Injector

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/west-wind/Threat-Hunting-With-Splunk

- https://github.com/whoforget/CVE-POC

- https://github.com/xinyisleep/pocscan

- https://github.com/xr0r/Dorks

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/youcans896768/APIV_Tool

- https://github.com/youwizard/CVE-POC

- https://github.com/zecool/cve

- https://github.com/zidanfanshao/vcenter_tools