CVE-2022-23463: Nepxion Discovery vulnerable to SpEL Injection leading to Remote Code Execution
9.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.86298%
CWE
Published
9/25/2022
Updated
1/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.nepxion:discovery | maven | <= 6.16.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The primary vulnerability stems from DiscoveryExpressionResolver.eval
using StandardEvaluationContext
with user-controlled SpEL expressions. This allows attackers to execute arbitrary code via expressions like T(java.lang.Runtime).getRuntime().exec()
. StrategyResourceImpl.validateExpression
is the entry point that propagates untrusted input to the vulnerable eval
method. Both functions are explicitly referenced in the GHSL-2022-033 advisory and code snippets showing the injection flow.