mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-06-20 18:00:22 +00:00
add: CVE-2022-22947
This commit is contained in:
parent
8b0f1aae4e
commit
6b27c6162e
9
Spring/CVE-2022-22947/README.md
Normal file
9
Spring/CVE-2022-22947/README.md
Normal file
@ -0,0 +1,9 @@
|
||||
# Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)
|
||||
|
||||
Spring Cloud Gateway is the second-generation gateway framework officially launched by Spring Cloud, replacing the Zuul gateway. As the traffic, the gateway plays a very important role in the microservice system. The common functions of the gateway include routing and forwarding, permission verification, and current limiting control. Applications using Spring Cloud Gateway in the version prior to 3.1.0 and 3.0.6, are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.
|
||||
|
||||
FOFA **query rule**: [app="Spring-GW"](https://fofa.info/result?qbase64=YXBwPSJTcHJpbmctR1ci)
|
||||
|
||||
# Demo
|
||||
|
||||

|
Binary file not shown.
After Width: | Height: | Size: 1.1 MiB |
Loading…
x
Reference in New Issue
Block a user