CVE-2022-22947

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-22947
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-22947.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-22947
Aliases
Published
2022-03-03T22:15:08Z
Modified
2024-10-12T09:12:35.357807Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.

References

Affected packages

Git / github.com/spring-cloud/spring-cloud-gateway

Affected ranges

Type
GIT
Repo
https://github.com/spring-cloud/spring-cloud-gateway
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.0.M1
v1.0.0.RC1
v1.0.0.RELEASE
v1.0.1.RELEASE

v2.*

v2.0.0.M1
v2.0.0.M2
v2.0.0.M3
v2.0.0.M4
v2.0.0.M5
v2.0.0.M6
v2.0.0.M7
v2.0.0.M8
v2.0.0.M9
v2.0.0.RC1
v2.0.0.RC2
v2.0.0.RELEASE
v2.0.1.RELEASE
v2.0.2.RELEASE
v2.0.3.RELEASE
v2.1.0.M1
v2.1.0.M2
v2.1.0.M3
v2.1.0.RC1
v2.1.0.RC2
v2.1.0.RC3
v2.1.0.RELEASE
v2.1.1.RELEASE
v2.1.3.RELEASE
v2.1.4.RELEASE
v2.2.0.M2
v2.2.0.M3
v2.2.0.RC1
v2.2.0.RC2
v2.2.0.RELEASE
v2.2.1.RELEASE
v2.2.2.RELEASE
v2.2.3.RELEASE
v2.2.4.RELEASE
v2.2.5.RELEASE
v2.2.6.RELEASE
v2.2.7.RELEASE
v2.2.8.RELEASE

v3.*

v3.0.0
v3.0.0-M2
v3.0.0-M3
v3.0.0-M4
v3.0.0-M5
v3.0.0-M6
v3.0.0-RC1
v3.0.0.M1
v3.0.1
v3.0.2
v3.0.3
v3.0.4
v3.0.5
v3.0.6