CVE-2021-45029: Apache ShenYu (incubating) Groovy Code Injection and SpEL Injection

Related Vulnerabilities: CVE-2021-45029  
                							

                <!--X-Body-Begin-->
<!--X-User-Header-->

oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->

By Date

By Thread

</form>

<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2021-45029: Apache ShenYu (incubating) Groovy Code Injection and SpEL Injection

<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->

From: Zhang Yonglun &lt;zhangyonglun () apache org&gt;

Date: Wed, 26 Jan 2022 14:21:09 +0800

<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->

<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Severity: moderate

Description:

Groovy Code Injection &amp; SpEL Injection which lead to Remote Code Execution.
Apache ShenYu (incubating)  provides some plugins, and we can define
our own Selectors And Rules in which we can set some condition match
including "match = regEx like contain SpEL Groovy".
There are no filters to avoid Remote Code Execution before
parseExpression and Eval.me.
This issue affects Apache ShenYu (incubating)  2.4.0 and 2.4.1.

Mitigation:

Upgrade to Apache ShenYu (incubating) 2.4.2 or apply patch
https://github.com/apache/incubator-shenyu/pull/2576.

--

Zhang Yonglun
Apache ShenYu (Incubating)
Apache ShardingSphere

<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->

<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->

By Date

By Thread

Current thread:

CVE-2021-45029: Apache ShenYu (incubating) Groovy Code Injection and SpEL Injection Zhang Yonglun (Jan 26)

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->