First published: Fri Dec 09 2022(Updated: )
Spring boot admins is an open source administrative user interface for management of spring boot applications. All users who run Spring Boot Admin Server, having enabled Notifiers (e.g. Teams-Notifier) and write access to environment variables via UI are affected. Users are advised to upgrade to the most recent releases of Spring Boot Admin 2.6.10 and 2.7.8 to resolve this issue. Users unable to upgrade may disable any notifier or disable write access (POST request) on `/env` actuator endpoint.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Spring Boot Admin | <2.6.10 | |
Spring Boot Admin | >=2.7.0<2.7.8 | |
Spring Boot Admin | =3.0.0-m1 | |
Spring Boot Admin | =3.0.0-m2 | |
Spring Boot Admin | =3.0.0-m3 | |
Spring Boot Admin | =3.0.0-m4 | |
Spring Boot Admin | =3.0.0-m5 |
https://github.com/codecentric/spring-boot-admin/commit/c14c3ec12533f71f84de9ce3ce5ceb7991975f75
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-46166 is considered a significant vulnerability affecting Spring Boot Admin Server with specific configurations.
To fix CVE-2022-46166, users should upgrade to a version of Spring Boot Admin that is not affected, specifically above 2.6.10 or 2.7.8, or the later milestone versions for 3.0.0.
CVE-2022-46166 affects Spring Boot Admin versions up to 2.6.10, versions between 2.7.0 and 2.7.8, and milestones 1 through 5 of 3.0.0.
All users running Spring Boot Admin Server with enabled Notifiers and write access to environment variables via the UI are affected by CVE-2022-46166.
CVE-2022-46166 can potentially allow unauthorized changes to environment variables, leading to configuration manipulation of Spring Boot applications.