Vulnerabilities
Vulnerable Software
Apache:  >> Shenyu  >> 2.4.1  Security Vulnerabilities
In Apache ShenYui, ShenYu-Bootstrap, RegexPredicateJudge.java uses Pattern.matches(conditionData.getParamValue(), realData) to make judgments, where both parameters are controllable by the user. This can cause an attacker pass in malicious regular expressions and characters causing a resource exhaustion. This issue affects Apache ShenYu (incubating) 2.4.0, 2.4.1 and 2.4.2 and is fixed in 2.4.3.
CVSS Score
7.5
EPSS Score
0.005
Published
2022-05-17
On Apache ShenYu versions 2.4.0 and 2.4.1, and endpoint existed that disclosed the passwords of all users. Users are recommended to upgrade to version 2.4.2 or later.
CVSS Score
7.5
EPSS Score
0.035
Published
2022-01-25
User can access /plugin api without authentication. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
CVSS Score
9.1
EPSS Score
0.915
Published
2022-01-25
Missing authentication on ShenYu Admin when register by HTTP. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
CVSS Score
7.5
EPSS Score
0.011
Published
2022-01-25
Groovy Code Injection & SpEL Injection which lead to Remote Code Execution. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
CVSS Score
9.8
EPSS Score
0.053
Published
2022-01-25


Contact Us

Shodan ® - All rights reserved