CVE-2022-22947

Published Mar 3, 2022

Last updated a year ago

Overview

Description
In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.
Source
security@vmware.com
NVD status
Analyzed

Social media

Hype score
Not currently trending

Risk scores

CVSS 3.1

Type
Primary
Base score
10
Impact score
6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Severity
CRITICAL

CVSS 2.0

Type
Primary
Base score
6.8
Impact score
6.4
Exploitability score
8.6
Vector string
AV:N/AC:M/Au:N/C:P/I:P/A:P

Known exploits

Data from CISA

Vulnerability name
VMware Spring Cloud Gateway Code Injection Vulnerability
Exploit added on
May 16, 2022
Exploit action due
Jun 6, 2022
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-917
security@vmware.com
CWE-94

Configurations