Within the framework of CVE-2022-22963; in Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
Within the framework of CVE-2022-22965; it has been revealed that a new vulnerability on Spring MVC or Spring WebFlux applications may lead to remote code execution on affected systems. At this time, it’s thought that the Spring MVC or Spring WebFlux applications run as WAR deployments on Tomcat are vulnerable, however; as the nature of the vulnerability is more general, there may be other yet unknown exploits using this vulnerability, either now or in the future (For these vulnerabilities, no analyses have been made and no CVSS scores have been assigned by NIST yet).
Affected Systems
Applications that meet the criteria below are thought to be affected;
CVE-2022-22963;
CVE-2022-22965;
IoC’s
-
Recommended Solution(s)
The following mitigations have been suggested;
CVE-2022-22963;
CVE-2022-22965;
To avoid the effects of these vulnerabilities; it is recommended to follow the steps prepared by our technical team for McAfee IPS.
Security Warning | Recommended Solution(s) | ZIP |
---|---|---|
McAfee IPS | View Pdf | Download Zip |
CVE / CWE
CVE-2022-22963, CVE-2022-22965
Related Website(s)
* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.
+90 216 504 53 32
Aydınevler Mahallesi,İsmet İnönü Cadddesi,Küçükyalı Ofis Park A Blok,No:20/1 Maltepe İstanbul
+90 312 235 44 51
You can register to our newsletter on the home page to be instantly informed about security vulnerabilities.