Description
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
Remediation
References
https://tanzu.vmware.com/security/cve-2022-22963
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
http://packetstormsecurity.com/files/173430/Spring-Cloud-3.2.2-Remote-Command-Execution.html
Related Vulnerabilities
CVE-2023-48796 Vulnerability in maven package org.apache.dolphinscheduler:dolphinscheduler-worker
CVE-2023-45143 Vulnerability in npm package undici
CVE-2022-1466 Vulnerability in maven package org.keycloak:keycloak-core
CVE-2022-36895 Vulnerability in maven package com.compuware.jenkins:compuware-topaz-utilities
CVE-2010-2076 Vulnerability in maven package org.apache.axis2:axis2-kernel