Vulnerability Details CVE-2021-22053
Applications using both `spring-cloud-netflix-hystrix-dashboard` and `spring-boot-starter-thymeleaf` expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at `/hystrix/monitor;[user-provided data]`, the path elements following `hystrix/monitor` are being evaluated as SpringEL expressions, which can lead to code execution.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.874
EPSS Ranking 99.4%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 6.5
Products affected by CVE-2021-22053
-
cpe:2.3:a:vmware:spring_cloud_netflix:2.2.0
-
cpe:2.3:a:vmware:spring_cloud_netflix:2.2.1
-
cpe:2.3:a:vmware:spring_cloud_netflix:2.2.2
-
cpe:2.3:a:vmware:spring_cloud_netflix:2.2.3
-
cpe:2.3:a:vmware:spring_cloud_netflix:2.2.4
-
cpe:2.3:a:vmware:spring_cloud_netflix:2.2.5
-
cpe:2.3:a:vmware:spring_cloud_netflix:2.2.6
-
cpe:2.3:a:vmware:spring_cloud_netflix:2.2.7
-
cpe:2.3:a:vmware:spring_cloud_netflix:2.2.8
-
cpe:2.3:a:vmware:spring_cloud_netflix:2.2.9