Spring Cloud Function SpEL Injection

Discussion in 'News Aggregator' started by Packet Storm, 1 Apr 2022.

  1. Packet Storm

    Packet Storm Guest

    Spring Cloud Function versions prior to 3.1.7 and 3.2.3 are vulnerable to remote code execution due to using an unsafe evaluation context with user-provided queries. By crafting a request to the application and setting the spring.cloud.function.routing-expression header, an unauthenticated attacker can gain remote code execution. Both patched and unpatched servers will respond with a 500 server error and a JSON encoded message.

    Continue reading...
     

Share This Page

Loading...