Description Preview
Overview
The vulnerability in Spring Cloud Netflix's Hystrix Dashboard allows a malicious user to abuse the proxy.stream endpoint to send requests to arbitrary servers that are reachable from the dashboard host. This represents a server-side request forgery (SSRF) vulnerability (CWE-610) that could be exploited to access internal services not intended for public access. An attacker could potentially use this vulnerability to bypass network security controls, access internal services, or perform reconnaissance on internal network architecture.
Remediation
To remediate this vulnerability, users should update to the following versions:
- For Spring Cloud Netflix 2.2.x: Update to version 2.2.4 or later
- For Spring Cloud Netflix 2.1.x: Update to version 2.1.6 or later
- For older versions: Upgrade to a supported version with the security fix
If immediate updating is not possible, consider implementing network-level controls to restrict the servers that the Hystrix Dashboard can communicate with, or temporarily disable the Hystrix Dashboard functionality until updates can be applied.
References
- VMware Tanzu Security Advisory: https://tanzu.vmware.com/security/cve-2020-5412
- CWE-610: Externally Controlled Reference to a Resource in Another Sphere
- Spring Cloud Netflix GitHub repository: https://github.com/spring-cloud/spring-cloud-netflix
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- ManufacturingManufacturing
- Transportation & WarehousingTransportation & Warehousing
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- UtilitiesUtilities
- Wholesale TradeWholesale Trade