Code injection in spring-cloud-netflix-hystrix-dashboard
High severity
GitHub Reviewed
Published
Nov 23, 2021
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Package
Affected versions
<= 2.2.9.RELEASE
Patched versions
2.2.10.RELEASE
Description
Published by the National Vulnerability Database
Nov 19, 2021
Reviewed
Nov 22, 2021
Published to the GitHub Advisory Database
Nov 23, 2021
Last updated
Feb 1, 2023
Applications using the
spring-cloud-netflix-hystrix-dashboard
expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at/hystrix/monitor;[user-provided data]
, the path elements followinghystrix/monitor
are being evaluated as SpringEL expressions, which can lead to code execution.References