vendor:
Spring Cloud Gateway
by:
Carlos E. Vieira
10
CVSS
CRITICAL
Remote Code Execution (RCE)
78
CWE
Product Name: Spring Cloud Gateway
Affected Version From: 3.1.2000
Affected Version To: 3.0.7
Patch Exists: YES
Related CWE: CVE-2022-22947
CPE: a:pivotal_software:spring_cloud_gateway
Tags: cve,cve2022,apache,spring,vmware,actuator,oast,kev
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Nuclei References:
https://nvd.nist.gov/vuln/detail/CVE-2022-22947, https://wya.pl/2022/02/26/cve-2022-22947-spel-casting-and-evil-beans/, https://github.com/wdahlenburg/spring-gateway-demo, https://spring.io/blog/2022/03/01/spring-cloud-gateway-cve-reports-published, https://tanzu.vmware.com/security/cve-2022-22947
Nuclei Metadata: {'max-request': 3, 'vendor': 'vmware', 'product': 'spring_cloud_gateway'}
Platforms Tested: 3.1.2000
2022
Spring Cloud Gateway 3.1.0 – Remote Code Execution (RCE)
Spring Cloud Gateway versions < 3.0.7 & < 3.1.1 are vulnerable to Remote Code Execution (RCE). An attacker can exploit this vulnerability by sending a malicious payload to the /actuator/gateway/routes/ endpoint, which will execute arbitrary code on the server. The payload is then sent to the /actuator/gateway/refresh endpoint, which will execute the malicious code.
Mitigation:
Upgrade to Spring Cloud Gateway version 3.0.7 or 3.1.1 or later.