Arbitrary Code Execution Affecting org.apache.shenyu:shenyu-bootstrap-dist package, versions [,2.4.2)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.Test your applications
- Snyk ID SNYK-JAVA-ORGAPACHESHENYU-2361193
- published 25 Jan 2022
- disclosed 25 Jan 2022
- credit Unknown
How to fix?
org.apache.shenyu:shenyu-bootstrap-dist to version 2.4.2 or higher.
Affected versions of this package are vulnerable to Arbitrary Code Execution via the
Groovy Code &
SpEL plugins, which allowed for command injections.