CVE-2021-22051: Spring Cloud Gateway Request Vulnerability

HIGH | NOVEMBER 04, 2021 | CVE-2021-22051

Description

Applications using Spring Cloud Gateway are vulnerable to specifically crafted requests that could make an extra request on downstream services.

Affected Spring Products and Versions

  • Spring Cloud Gateway
    • 3.0.0 to 3.0.4
    • 2.2.0.RELEASE to 2.2.9.RELEASE
    • Older, unsupported versions are also affected

Mitigation

Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.5+, 2.2.x users should upgrade to 2.2.10.RELEASE+. No other steps are necessary. Releases that have fixed this issue include:

  • Spring Cloud Gateway
    • 3.0.5+

CVE-2021-22044: Spring Cloud OpenFeign Client Endpoint Exposure

HIGH | OCTOBER 26, 2021 | CVE-2021-22044

Description

Applications using type-level @RequestMappingannotations over Feign client interfaces, can be involuntarily exposing endpoints corresponding to @RequestMapping-annotated interface methods. Although a response is not returned for a request sent in…

CVE-2021-22096: Log Injection in Spring Framework

MEDIUM | OCTOBER 26, 2021 | CVE-2021-22096

Description

In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.

Affected Spring Products and Versions

  • Spring Framework
    • 5.3.0 to 5.3.10
    • 5.2.0 to 5.2.17
    • Older, unsupported versions are also affected

Mitigation

CVE-2021-22118: Local Privilege Escalation within Spring Webflux Multipart Request Handling

MEDIUM | MAY 25, 2021 | CVE-2021-22118

Description

In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or modify files that have been uploaded to the WebFlux application, or overwrite arbitrary files with multipart request data.

Spring MVC applications are not affected by this vulnerability, nor are applications that do not handle multipart file requests.

Affected Spring Products and Versions

  • Spring Framework
    • 5.2.0 to 5.2.14
    • 5.3.0 to 5.3.6

Mitigation

Users of affected versions should apply the following mitigation. 5.3.x users should upgrade to 5.3.7. 5.2.x users should upgrade to 5.2.15. No other steps are necessary. Releases that have fixed this issue include:

  • Spring Framework
    • 5.3.7

Get ahead

VMware offers training and certification to turbo-charge your progress.

Learn more

Get support

Tanzu Spring offers support and binaries for OpenJDK™, Spring, and Apache Tomcat® in one simple subscription.

Learn more

Upcoming events

Check out all the upcoming events in the Spring community.

View all