First published: Tue Feb 23 2021(Updated: )
Applications using the “Sensitive Headers” functionality in Spring Cloud Netflix Zuul 2.2.6.RELEASE and below may be vulnerable to bypassing the “Sensitive Headers” restriction when executing requests with specially constructed URLs. Applications that use Spring Security's StrictHttpFirewall (enabled by default for all URLs) are not affected by the vulnerability, as they reject requests that allow bypassing.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vmware Spring Cloud Netflix Zuul | <=2.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22113 is classified as a high-severity vulnerability.
To fix CVE-2021-22113, upgrade Spring Cloud Netflix Zuul to version 2.2.7.RELEASE or later.
CVE-2021-22113 affects applications using Spring Cloud Netflix Zuul versions 2.2.6.RELEASE and below.
CVE-2021-22113 can be exploited by bypassing the 'Sensitive Headers' restriction through specially constructed URLs.
CVE-2021-22113 can impact applications that use Spring Security's StrictHttpFirewall when implemented with vulnerable versions of Zuul.