4.3.1
4 years ago
1 months ago
Known vulnerabilities in the org.springframework.cloud:spring-cloud-gateway-server package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
Affected versions of this package are vulnerable to Expression Language Injection in route definitions. An attacker with permission to define routes can expose the server's file structure or other sensitive environment variables by crafting a SpEL expression to access sensitive system beans such as Note: Additional fixed versions might be available for commercial users of Spring Enterprise. How to fix Expression Language Injection? Upgrade | [,4.2.6)[4.3.0,4.3.2) |
Affected versions of this package are vulnerable to Expression Language Injection in the Only Webflux applications are vulnerable, not WebMVC applications. Additionally, the following conditions must be true to render an application vulnerable:
How to fix Expression Language Injection? Upgrade | [,4.2.5)[4.3.0,4.3.1) |
Affected versions of this package are vulnerable to Unintended Proxy or Intermediary ('Confused Deputy') due to the improper validation of Notes:
How to fix Unintended Proxy or Intermediary ('Confused Deputy')? Upgrade | [,3.1.10)[4.0.0,4.1.8)[4.2.0,4.2.3) |
Affected versions of this package are vulnerable to Arbitrary Code Injection via a maliciously crafted request. Note: This requires the Gateway Actuator endpoint to be enabled, exposed and insecure. How to fix Arbitrary Code Injection? Upgrade | [,3.0.7)[3.1.0,3.1.1) |