DIVD-2022-00024 - Spring Cloud RCE - CVE-2022-22963
|Case lead||Victor Pasman|
|Author||Pepijn van der Stap|
|Product||Spring Cloud Function|
|Versions||versions prior to 3.1.7 and 3.2.3|
|Recommendation||If you receive an email from DIVD referring to this case, the vulnerability has been confirmed. You should update the application to the newest versions 3.1.7 & 3.2.3.|
|Last modified||13 Mar 2023 12:49|
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted Spring Expression Language (SpEL) as a routing-expression that may result in remote code execution and access to local resources.
What you can do
- If you’re using the Spring Cloud Function library, you should upgrade to 3.1.7+ or 3.2.3+ to prevent exploitation.
What we are doing
- DIVD is currently ensuring that the owners of vulnerable systems are being notified. We do this by scanning for vulnerable hosts, verifying the vulnerability and notifying the owners of these systems. If you receive an email from us regarding this case, the vulnerability has been confirmed.
|31 Mar 2022||DIVD starts investigating the scope and impact of the vulnerability.|
|02 Apr 2022||First version of this case file.|
gantt title DIVD-2022-00024 - Spring Cloud RCE - CVE-2022-22963 dateFormat YYYY-MM-DD axisFormat %e %b %Y section Case DIVD-2022-00024 - Spring Cloud RCE - CVE-2022-22963 (175 days) :2022-03-31, 2022-09-22 section Events DIVD starts investigating the scope and impact of the vulnerability. : milestone, 2022-03-31, 0d First version of this case file. : milestone, 2022-04-02, 0d