CVE-2021-22053 – org.springframework.cloud:spring-cloud-netflix-hystrix-dashboard
Package
Manager: maven
Name: org.springframework.cloud:spring-cloud-netflix-hystrix-dashboard
Vulnerable Version: >=0 <2.2.10.release
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N
EPSS: 0.87383 pctl0.99419
Details
Code injection in spring-cloud-netflix-hystrix-dashboard Applications using the `spring-cloud-netflix-hystrix-dashboard` expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at `/hystrix/monitor;[user-provided data]`, the path elements following `hystrix/monitor` are being evaluated as SpringEL expressions, which can lead to code execution.
Metadata
Created: 2021-11-23T17:53:33Z
Modified: 2021-11-22T19:53:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/11/GHSA-gx3f-hq7p-8fxv/GHSA-gx3f-hq7p-8fxv.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-gx3f-hq7p-8fxv
Finding: F422
Auto approve: 1