Skip to main content

CVE-2022-23463: CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') in Nepxion Discover

Medium
Published: Sat Sep 24 2022 (09/24/2022, 04:40:12 UTC)
Source: CVE
Vendor/Project: Nepxion
Product: Discover

Description

Nepxion Discovery is a solution for Spring Cloud. Discover is vulnerable to SpEL Injection in discovery-commons. DiscoveryExpressionResolver’s eval method is evaluating expression with a StandardEvaluationContext, allowing the expression to reach and interact with Java classes such as java.lang.Runtime, leading to Remote Code Execution. There is no patch available for this issue at time of publication. There are no known workarounds.

AI-Powered Analysis

AILast updated: 06/21/2025, 23:48:26 UTC

Technical Analysis

CVE-2022-23463 is a vulnerability identified in Nepxion Discover version 6.16.2, a solution designed for Spring Cloud environments. The vulnerability arises from improper neutralization of special elements used in an Expression Language (SpEL) statement, classified under CWE-917. Specifically, the issue resides in the DiscoveryExpressionResolver component's eval method, which evaluates expressions using a StandardEvaluationContext. This context allows the evaluated expression to access and interact with Java classes, including sensitive ones such as java.lang.Runtime. Consequently, an attacker can craft malicious SpEL expressions that lead to remote code execution (RCE) on the affected system. The vulnerability is critical because it enables execution of arbitrary code remotely without requiring authentication or user interaction. At the time of publication, no patches or workarounds are available, increasing the risk for organizations using this specific version of Nepxion Discover. Although no known exploits have been observed in the wild yet, the technical nature of the flaw and the lack of mitigation measures make it a significant threat vector, especially in environments where Nepxion Discover is deployed as part of microservices or cloud-native infrastructure.

Potential Impact

For European organizations, the impact of this vulnerability can be severe. Nepxion Discover is used in Spring Cloud-based microservice architectures, which are common in enterprise environments for service discovery and configuration management. Exploitation of this vulnerability could lead to full system compromise, allowing attackers to execute arbitrary commands, deploy malware, or move laterally within the network. This threatens confidentiality, integrity, and availability of critical business applications and data. Organizations in sectors such as finance, manufacturing, telecommunications, and government, which heavily rely on cloud-native applications and microservices, could face operational disruptions, data breaches, and regulatory non-compliance. The absence of patches or workarounds means that affected systems remain exposed until either an update is released or alternative mitigations are implemented. Additionally, the vulnerability could be leveraged in targeted attacks or supply chain compromises, amplifying its potential impact across interconnected systems.

Mitigation Recommendations

Given the absence of an official patch or workaround, European organizations should implement the following specific measures: 1) Conduct an immediate inventory to identify all instances of Nepxion Discover version 6.16.2 in their environment. 2) Isolate or restrict network access to affected services, especially limiting exposure to untrusted networks or the internet. 3) Employ strict input validation and sanitization at the application layer to prevent untrusted user input from reaching the vulnerable eval method. 4) Utilize runtime application self-protection (RASP) or Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SpEL expressions or anomalous requests targeting the discovery-commons component. 5) Monitor logs and network traffic for unusual activity indicative of exploitation attempts, such as unexpected command execution or access to java.lang.Runtime. 6) Engage with Nepxion or community forums for updates on patches or mitigations and plan for timely upgrades once available. 7) Consider deploying compensating controls such as containerization or sandboxing of services running Nepxion Discover to limit the blast radius of potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-01-19T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf6887

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 11:48:26 PM

Last updated: 8/14/2025, 3:31:54 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats