Update on Spring Data MongoDB SpEL Expression Injection Vulnerability (CVE-2022-22980)
2022-6-23 15:14:8 Author: lab.wallarm.com(查看原文) 阅读量:49 收藏

Background

On June 20, 2022 Spring released Spring Data MongoDB 3.4.1 and 3.3.5 to address a critical CVE report:

CVE-2022-22980: Spring Data MongoDB SpEL Expression injection vulnerability through annotated repository query methods. This vulnerability was originally reported on June 13, 2022. Wallarm SOC team already uses its exploitation in the wild.

Vulnerability

This vulnerability affects Spring Data MongoDB applications using repository query methods that are annotated with @Query or @Aggregation and use parameterized SpEL statements. A specific exploit requires non-sanitized input to the repository query method.

What is SpEL? From Spring documentation: The Spring Expression Language (SpEL for short) is a powerful expression language that supports querying and manipulating an object graph at runtime. There have been a number of critical vulnerabilities related to SpEL before.

Wallarm Provides Protection

We tested Wallarm’s attack detection against known exploits and have confirmed that they were successfully detected and blocked. No further actions are required when working in blocking mode.

To mitigate this vulnerability when working in monitoring mode, please contact our support team if you want us to create the rule.

Feel free to reach out to [email protected] if you need assistance.

Further updates will be published in Wallarm Changelog: https://changelog.wallarm.com

Subscribe for the latest news


文章来源: https://lab.wallarm.com/update-on-spring-data-mongodb-spel-expression-injection-vulnerability-cve-2022-22980/
如有侵权请联系:admin#unsafe.sh