Spring Cloud Netflix Hystrix Dashboard prior to version 2.2.10 is susceptible to remote code execution. Applications using both spring-cloud-netflix-hystrix-dashboard
and spring-boot-starter-thymeleaf
expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at /hystrix/monitor;[user-provided data]
, the path elements following hystrix/monitor
are being evaluated as SpringEL expressions, which can lead to code execution.
View the template here CVE-2021-22053.yaml
References:
https://nvd.nist.gov/vuln/detail/CVE-2021-22053