Skip to content

Latest commit

 

History

History
26 lines (20 loc) · 1.25 KB

spring-cloud-spel-code-injection-cve-2022-22963.md

File metadata and controls

26 lines (20 loc) · 1.25 KB
name severity cvss-score cvss-vector cwe-id cwe-name compliance
Spring Cloud SPEL Code Injection (CVE-2022-22963)
high
9.0
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
94
Improper Control of Generation of Code ('Code Injection')
HIPAA ISO 27001 PCI v4.0
164.306(a)
A.5.33, A.5.34, A.8.3, A.8.9, A.8.12
pci4-6.2.4

A remote code execution vulnerability (RCE) allows the attacker to execute arbitrary code and operating system commands on the server. In the worst-case scenario, the attacker will be able to fully compromise the server, extract sensitive data, modify the application contents or delete data.

The Spring Cloud versions 3.1.6 and 3.2.2, or below, if using the routing functionality, are vulnerable to RCE, identified as CVE-2022-22963. The vulnerability can be exploited with a specially crafted SpEL (short for Spring Expression Language) that results in remote code execution and access to local resources.

How to fix

{% tabs spring-cloud-spel-code-injection-cve-2022-22963 %} {% tab spring-cloud-spel-code-injection-cve-2022-22963 generic %} To fix this vulnerability, you need to update all instances of the Spring Cloud to version to versions 3.1.7 or 3.2.3, depending on your branch. {% endtab %}

{% endtabs %}