Remote Code Execution Affecting org.springframework.cloud:spring-cloud-function-context package, versions [,3.1.7)[3.2.0,3.2.3)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Mature
EPSS
97.49% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGSPRINGFRAMEWORKCLOUD-2436645
  • published30 Mar 2022
  • disclosed30 Mar 2022
  • creditm09u3r

Introduced: 30 Mar 2022

CVE-2022-22963  (opens in a new tab)
CWE-497  (opens in a new tab)
CWE-770  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade org.springframework.cloud:spring-cloud-function-context to version 3.1.7, 3.2.3 or higher.

Overview

Affected versions of this package are vulnerable to Remote Code Execution. An attacker is able to provide a crafted SpEL as a routing-expression that may result in access to local resources or even remote code execution.

CVSS Scores

version 3.1