CVE-2021-22051
Summary
| CVE | CVE-2021-22051 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-11-08 14:15:00 UTC |
| Updated | 2021-11-09 22:13:00 UTC |
| Description | Applications using Spring Cloud Gateway are vulnerable to specifically crafted requests that could make an extra request on downstream services. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.5+, 2.2.x users should upgrade to 2.2.10.RELEASE or newer. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| CVE-2021-22051: Spring Cloud Gateway Request Vulnerability | Security | VMware Tanzu |
MISC |
tanzu.vmware.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 980159 Java (maven) Security Update for org.springframework.cloud:spring-cloud-gateway (GHSA-2r2v-q399-qq93)