Description
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
Remediation
References
https://tanzu.vmware.com/security/cve-2022-22963
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
http://packetstormsecurity.com/files/173430/Spring-Cloud-3.2.2-Remote-Command-Execution.html
Related Vulnerabilities
CVE-2022-25897 Vulnerability in maven package org.eclipse.milo:sdk-server
CVE-2022-31172 Vulnerability in maven package org.webjars.npm:openzeppelin__contracts
CVE-2021-32621 Vulnerability in maven package org.xwiki.platform:xwiki-platform-dashboard-macro
CVE-2023-37263 Vulnerability in npm package @strapi/plugin-content-manager
CVE-2022-21213 Vulnerability in maven package org.webjars:mout