In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
22 Oct 2025, 00:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2022-03-03 22:15
Updated : 2025-10-22 00:17
NVD link : CVE-2022-22947
Mitre link : CVE-2022-22947
CVE.ORG link : CVE-2022-22947
JSON object : View
Products Affected
oracle
- communications_cloud_native_core_console
- communications_cloud_native_core_network_exposure_function
- communications_cloud_native_core_network_repository_function
- communications_cloud_native_core_service_communication_proxy
- communications_cloud_native_core_network_function_cloud_native_environment
- communications_cloud_native_core_security_edge_protection_proxy
- communications_cloud_native_core_binding_support_function
- communications_cloud_native_core_network_slice_selection_function
- commerce_guided_search
vmware
- spring_cloud_gateway
