First published: Wed Jun 22 2022(Updated: )
A Spring Data MongoDB application is vulnerable to SpEL Injection when using @Query or @Aggregation-annotated query methods with SpEL expressions that contain query parameter placeholders for value binding if the input is not sanitized.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vmware Spring Data Mongodb | <=3.3.4 | |
Vmware Spring Data Mongodb | =3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22980 has been classified as a high severity vulnerability due to its potential for remote exploitation.
To fix CVE-2022-22980, sanitize all inputs used in SpEL expressions and ensure that query parameters do not include untrusted data.
VMware Spring Data MongoDB versions up to and including 3.3.4 and version 3.4.0 are affected by CVE-2022-22980.
Yes, if exploited, CVE-2022-22980 can lead to unauthorized access and manipulation of data, affecting data integrity.
As of now, a patch has not been specifically mentioned, but users are advised to update their systems and follow best practices for input validation.