ID |
CVE-2021-22053
|
Sažetak |
Applications using both `spring-cloud-netflix-hystrix-dashboard` and `spring-boot-starter-thymeleaf` expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at `/hystrix/monitor;[user-provided data]`, the path elements following `hystrix/monitor` are being evaluated as SpringEL expressions, which can lead to code execution. |
Reference |
|
CVSS |
Base: | 6.5 |
Impact: | 6.4 |
Exploitability: | 8.0 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
SINGLE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
PARTIAL |
PARTIAL |
PARTIAL |
|
CVSS vektor |
AV:N/AC:L/Au:S/C:P/I:P/A:P |
Zadnje važnije ažuriranje |
23-11-2021 - 18:06 |
Objavljeno |
19-11-2021 - 16:15 |