Описание
Applications using both spring-cloud-netflix-hystrix-dashboard and spring-boot-starter-thymeleaf expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at /hystrix/monitor;[user-provided data], the path elements following hystrix/monitor are being evaluated as SpringEL expressions, which can lead to code execution.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 2.2.0 (включая) до 2.2.10 (исключая)
cpe:2.3:a:vmware:spring_cloud_netflix:*:*:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.85682
Высокий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-94
CWE-94
Связанные уязвимости
CVSS3: 7.6
github
около 4 лет назад
Code injection in spring-cloud-netflix-hystrix-dashboard
EPSS
Процентиль: 99%
0.85682
Высокий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-94
CWE-94