.. / CVE-2021-22053

Exploit for Spring Cloud Netflix Hystrix Dashboard <2.2.10 - Remote Code Execution (CVE-2021-22053)

Description:

Spring Cloud Netflix Hystrix Dashboard prior to version 2.2.10 is susceptible to remote code execution. Applications using both spring-cloud-netflix-hystrix-dashboard and spring-boot-starter-thymeleaf expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at /hystrix/monitor;[user-provided data], the path elements following hystrix/monitor are being evaluated as SpringEL expressions, which can lead to code execution.

Nuclei Template

View the template here CVE-2021-22053.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-22053.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2021-22053
https://github.com/SecCoder-Security-Lab/spring-cloud-netflix-hystrix-dashboard-cve-2021-22053
https://tanzu.vmware.com/security/cve-2021-22053
https://github.com/ARPSyndicate/kenzer-templates
https://github.com/trhacknon/Pocingit