CVE-2022-22963: Spring Cloud Function Code Injection with a specially crafted SpEL as a routing expression
(updated )
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
References
- github.com/advisories/GHSA-6v73-fgf6-w5j7
- github.com/spring-cloud/spring-cloud-function
- nvd.nist.gov/vuln/detail/CVE-2022-22963
- psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005
- tanzu.vmware.com/security/cve-2022-22963
- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH
- www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22963
- www.oracle.com/security-alerts/cpuapr2022.html
- www.oracle.com/security-alerts/cpujul2022.html
Code Behaviors & Features
Detect and mitigate CVE-2022-22963 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →