In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Expression Language Injection vulnerabilities in an interactive lesson.
Start learningUpgrade org.springframework.cloud:spring-cloud-gateway-server
to version 4.2.5, 4.3.1 or higher.
Affected versions of this package are vulnerable to Expression Language Injection in the GatewayEvaluationContext
method, which allows property modification that in turn enables code execution.
Only Webflux applications are vulnerable, not WebMVC applications. Additionally, the following conditions must be true to render an application vulnerable:
Spring Boot actuator is a dependency.
The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway
.