logo

CVE-2022-46166 de.codecentric:spring-boot-admin

Package

Manager: maven
Name: de.codecentric:spring-boot-admin
Vulnerable Version: >=0 <2.6.10 || >=2.7.0 <2.7.8 || >=3.0.0-m1 <3.0.0-m6

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.39006 pctl0.97176

Details

Spring Boot Admins integrated notifier support allows arbitrary code execution ### Impact All users who run Spring Boot Admin Server, having enabled Notifiers (e.g. Teams-Notifier) and write access to environment variables via UI are possibly affected. ### Patches In the most recent releases of Spring Boot Admin 2.6.10 and 2.7.8 the issue is fixed by implementing `SimpleExecutionContext` of SpEL. This prevents the arbitrary code execution (i.e. SpEL injection). ### Workarounds * Disable any notifier * Disable write access (POST request) on `/env` actuator endpoint

Metadata

Created: 2022-12-09T20:19:32Z
Modified: 2022-12-09T20:19:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-w3x5-427h-wfq6/GHSA-w3x5-427h-wfq6.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-w3x5-427h-wfq6
Finding: F422
Auto approve: 1