org.apache.shenyu:shenyu-plugin-base@2.4.0 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.shenyu:shenyu-plugin-base package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Regular Expression Denial of Service (ReDoS)

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). RegexPredicateJudge.java uses Pattern.matches(conditionData.getParamValue(), realData) to make judgments, where both parameters are controllable by the user. This can cause an attacker to pass in malicious regular expressions and characters causing resource exhaustion.

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade org.apache.shenyu:shenyu-plugin-base to version 2.4.3 or higher.

[2.4.0,2.4.3)
  • C
Access Restriction Bypass

Affected versions of this package are vulnerable to Access Restriction Bypass due to missing authentication on ShenYu Admin, which allows leakage of user passwords in HTTP responses.

How to fix Access Restriction Bypass?

Upgrade org.apache.shenyu:shenyu-plugin-base to version 2.4.2 or higher.

[,2.4.2)
  • C
Arbitrary Code Execution

Affected versions of this package are vulnerable to Arbitrary Code Execution via the Groovy Code & SpEL plugins, which allowed for command injections.

How to fix Arbitrary Code Execution?

Upgrade org.apache.shenyu:shenyu-plugin-base to version 2.4.2 or higher.

[,2.4.2)