CVE-2022-22979

7.5 HIGH

📋 TL;DR

A caching vulnerability in Spring Cloud Function's Function Catalog component allows attackers to cause denial-of-service conditions by exploiting lookup functionality. This affects applications using Spring Cloud Function versions before 3.2.6 that expose framework lookup features to users. The vulnerability enables resource exhaustion attacks against affected systems.

💻 Affected Systems

Products:
  • Spring Cloud Function
Versions: All versions prior to 3.2.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications that expose framework lookup functionality to users. Applications using Spring Cloud Function internally without exposing lookup features may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability due to resource exhaustion, potentially affecting downstream dependent services and causing extended downtime.

🟠

Likely Case

Degraded application performance or temporary service interruptions affecting specific functions or endpoints.

🟢

If Mitigated

Minimal impact with proper rate limiting, resource monitoring, and access controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires direct interaction with framework lookup functionality. Attack vectors may include specially crafted HTTP requests or function invocations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.6 or later

Vendor Advisory: https://tanzu.vmware.com/security/cve-2022-22979

Restart Required: Yes

Instructions:

1. Update Spring Cloud Function dependency to version 3.2.6 or later. 2. Update pom.xml or build.gradle with new version. 3. Rebuild and redeploy application. 4. Restart affected services.

🔧 Temporary Workarounds

Disable or restrict lookup functionality

all

Remove or restrict access to framework lookup endpoints if not required for application functionality.

Implement rate limiting

all

Add rate limiting to function lookup endpoints to prevent resource exhaustion attacks.

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all function lookup requests
  • Deploy Web Application Firewall (WAF) with DoS protection rules

🔍 How to Verify

Check if Vulnerable:

Check Spring Cloud Function version in pom.xml, build.gradle, or application dependencies. Verify if version is below 3.2.6.

Check Version:

grep -i 'spring-cloud-function' pom.xml || grep -i 'spring-cloud-function' build.gradle || mvn dependency:tree | grep spring-cloud-function

Verify Fix Applied:

Confirm Spring Cloud Function version is 3.2.6 or higher in dependencies and verify application restart completed successfully.

📡 Detection & Monitoring

Log Indicators:

  • Unusual frequency of function lookup requests
  • Increased memory or CPU usage patterns
  • Error logs related to function catalog or caching

Network Indicators:

  • High volume of requests to function lookup endpoints
  • Abnormal request patterns to Spring Cloud Function endpoints

SIEM Query:

source="application.logs" AND ("function lookup" OR "FunctionCatalog") AND (frequency > 1000 per minute)

🔗 References

📤 Share & Export