• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Spring Cloud Gateway Exploit Attempt - CVE-2022-22947

Risk Factors

This code injection vulnerability is well known, and public exploit code is available. An unauthenticated attacker could gain complete control of a device, steal sensitive information, or launch additional attacks on the network.

Kill Chain

Exploitation

Risk Score

94

Detection diagram
Next in Exploitation: Spring4Shell Exploit Attempt - CVE-2022-22965

Attack Background

Spring is a common open-source Java development framework often deployed on Apache Tomcat. Spring Cloud Gateway is an API library that provides a framework for developing API gateways for Java web applications. Spring Cloud Gateway has a code injection vulnerability when the Gateway Actuator endpoint is enabled. The attacker sends an HTTP POST request to the vulnerable endpoint, /actuator/gateway/routes, with a malicious Java command sequence in the request body. The Spring server then runs the malicious command.

Mitigation Options

Upgrade Spring Cloud Gateway to version 3.0.7, 3.1.1, or later

MITRE ATT&CK ID

What else can RevealX do for you?