oss-sec mailing list archives
CVE-2021-45029: Apache ShenYu (incubating) Groovy Code Injection and SpEL Injection
From: Zhang Yonglun <zhangyonglun () apache org>
Date: Wed, 26 Jan 2022 14:21:09 +0800
Severity: moderate Description: Groovy Code Injection & SpEL Injection which lead to Remote Code Execution. Apache ShenYu (incubating) provides some plugins, and we can define our own Selectors And Rules in which we can set some condition match including "match = regEx like contain SpEL Groovy". There are no filters to avoid Remote Code Execution before parseExpression and Eval.me. This issue affects Apache ShenYu (incubating) 2.4.0 and 2.4.1. Mitigation: Upgrade to Apache ShenYu (incubating) 2.4.2 or apply patch https://github.com/apache/incubator-shenyu/pull/2576. -- Zhang Yonglun Apache ShenYu (Incubating) Apache ShardingSphere
Current thread:
- CVE-2021-45029: Apache ShenYu (incubating) Groovy Code Injection and SpEL Injection Zhang Yonglun (Jan 26)