Description
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
Remediation
References
http://packetstormsecurity.com/files/173430/Spring-Cloud-3.2.2-Remote-Command-Execution.html
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005
https://tanzu.vmware.com/security/cve-2022-22963
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
Related Vulnerabilities
CVE-2022-39250 Vulnerability in npm package matrix-js-sdk
CVE-2023-26102 Vulnerability in npm package rangy
CVE-2020-2249 Vulnerability in maven package org.jenkins-ci.plugins:tfs
CVE-2020-28480 Vulnerability in maven package org.webjars.bower:jointjs
CVE-2022-25869 Vulnerability in maven package org.webjars.bower:angular