Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-22963

Опубликовано: 29 мар. 2022
Источник: redhat
CVSS3: 9.8

Описание

In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.

A flaw was found in Spring Cloud Function via the spring.cloud.function.routing-expression header that is modified by the attacker to contain malicious expression language code. The attacker is able to call functions that should not normally be accessible, including runtime exec calls.

Меры по смягчению последствий

Affected customers should update immediately as soon as patched software is available. There are no other mitigations available at this time.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Serverlessspring-cloud-functionNot affected
Openshift Serveless 1.21openshift-serverless-1/client-kn-rhel8FixedRHSA-2022:129211.04.2022
Openshift Serveless 1.21openshift-serverless-1/kn-cli-artifacts-rhel8FixedRHSA-2022:129211.04.2022
Openshift Serverless 1 on RHEL 8openshift-serverless-clientsFixedRHSA-2022:129111.04.2022

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=2070668spring-cloud-function: Remote code execution by malicious Spring Expression

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 4 года назад

In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.

CVSS3: 9.8
github
почти 4 года назад

Spring Cloud Function Code Injection with a specially crafted SpEL as a routing expression

9.8 Critical

CVSS3