Vulnerabilities > CVE-2022-22947 - Expression Language Injection vulnerability in multiple products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Related news
- SpringShell attacks target about one in six vulnerable orgs (source)
- Microsoft: Sysrv botnet targets Windows, Linux servers with new exploits (source)
- Watch Out! Hackers Begin Exploiting Recent Zyxel Firewalls RCE Vulnerability (source)
- New Sysrv Botnet Variant Hijacking Windows and Linux with Crypto Miners (source)
- Sysrv-K Botnet Targets Windows, Linux (source)
References
- https://tanzu.vmware.com/security/cve-2022-22947
- http://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- http://packetstormsecurity.com/files/168742/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html