CVE-2021-22053: Improper Control of Generation of Code ('Code Injection')
Applications using both spring-cloud-netflix-hystrix-dashboard
and spring-boot-starter-thymeleaf
expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at /hystrix/monitor;[user-provided data]
, the path elements following hystrix/monitor
are being evaluated as SpringEL expressions, which can lead to code execution.
References
Detect and mitigate CVE-2021-22053 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →