org.springframework.cloud:spring-cloud-gateway-server@2.2.8.RELEASE vulnerabilities

  • latest version

    4.2.2

  • first published

    4 years ago

  • latest version published

    2 months ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.springframework.cloud:spring-cloud-gateway-server package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Unintended Proxy or Intermediary ('Confused Deputy')

    Affected versions of this package are vulnerable to Unintended Proxy or Intermediary ('Confused Deputy') due to the improper validation of X-Forwarded-For and Forwarded headers forwarded from untrusted proxies. An attacker can manipulate the server's behavior by sending crafted headers from an untrusted proxy.

    Notes:

    1. The vulnerability was also fixed in version 4.0.12, a commercial version;

    2. The X-Forwarded-* and Forwarded header functionality will be disabled by default with the fix versions. If you require X-Forwarded-* or Forwarded header functionality, after upgrading you will need to set spring.cloud.gateway.trusted-proxies to a Java Regular Expression that specifies the proxies whose headers you trust. If you are using Spring Cloud Gateway Server MVC (only available from 4.1.x onward) set spring.cloud.gateway.mvc.trusted-proxies.

    How to fix Unintended Proxy or Intermediary ('Confused Deputy')?

    Upgrade org.springframework.cloud:spring-cloud-gateway-server to version 3.1.10, 4.1.8, 4.2.3 or higher.

    [,3.1.10)[4.0.0,4.1.8)[4.2.0,4.2.3)
    • C
    Arbitrary Code Injection

    Affected versions of this package are vulnerable to Arbitrary Code Injection via a maliciously crafted request. Note: This requires the Gateway Actuator endpoint to be enabled, exposed and insecure.

    How to fix Arbitrary Code Injection?

    Upgrade org.springframework.cloud:spring-cloud-gateway-server to version 3.0.7, 3.1.1 or higher.

    [,3.0.7)[3.1.0,3.1.1)
    • H
    HTTP Request Smuggling

    Affected versions of this package are vulnerable to HTTP Request Smuggling. Applications using Spring Cloud Gateway are vulnerable to specifically crafted requests that could make an extra request on downstream services.

    How to fix HTTP Request Smuggling?

    Upgrade org.springframework.cloud:spring-cloud-gateway-server to version 3.0.5, 2.2.10.RELEASE or higher.

    [3.0.0,3.0.5)[,2.2.10.RELEASE)