Description
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
Remediation
References
http://packetstormsecurity.com/files/173430/Spring-Cloud-3.2.2-Remote-Command-Execution.html
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005
https://tanzu.vmware.com/security/cve-2022-22963
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
Related Vulnerabilities
CVE-2021-29486 Vulnerability in npm package cumulative-distribution-function
CVE-2019-20174 Vulnerability in maven package org.webjars.npm:auth0-lock
CVE-2021-40146 Vulnerability in maven package org.apache.any23:apache-any23-core
CVE-2020-8124 Vulnerability in npm package url-parse
CVE-2023-45648 Vulnerability in maven package org.apache.tomcat:tomcat