QID 150562

QID 150562: Spring Cloud Gateway Remote Code Execution Vulnerability (CVE-2022-22947)

Spring Cloud Gateway aims to provide a simple, yet effective way to route to APIs and provide cross cutting concerns to them such as: security, monitoring/metrics, and resiliency.

The installed version of spring cloud gateway application is vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.

Affected Versions:
Spring Cloud Gateway 3.1.0
Spring Cloud Gateway 3.0.0 to 3.0.6
Older, unsupported versions are also affected

QID Detection Logic:
This QID sends a HTTP POST request containing the payload which triggers a remote code execution on the application. On successful execution, a payload gets executed and detected in the response.

Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the target system.

  • CVSS V3 rated as Critical - 10 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    Customers are advised to Upgrade to Spring Cloud Gateway version 3.0.7, 3.1.1, or later to remediate this vulnerability. For more information regarding this vulnerability please refer VMware Security Advisory
    Vendor References

    CVEs related to QID 150562

    Software Advisories
    Advisory ID Software Component Link
    VMware URL Logo tanzu.vmware.com/security/cve-2022-22947