Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-23464: CWE-918 Server-Side Request Forgery (SSRF) in Nepxion Discovery

0
Medium
Published: Sat Sep 24 2022 (09/24/2022, 04:40:08 UTC)
Source: CVE
Vendor/Project: Nepxion
Product: Discovery

Description

Nepxion Discovery is a solution for Spring Cloud. Discovery is vulnerable to a potential Server-Side Request Forgery (SSRF). RouterResourceImpl uses RestTemplate’s getForEntity to retrieve the contents of a URL containing user-controlled input, potentially resulting in Information Disclosure. There is no patch available for this issue at time of publication. There are no known workarounds.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 06/21/2025, 23:44:10 UTC

Technical Analysis

CVE-2022-23464 is a Server-Side Request Forgery (SSRF) vulnerability identified in Nepxion Discovery version 6.16.2, a service discovery solution designed for Spring Cloud environments. The vulnerability arises from the RouterResourceImpl component, which uses the Spring RestTemplate's getForEntity method to fetch the contents of a URL that includes user-controlled input. Because the URL is not properly validated or sanitized, an attacker can manipulate the input to coerce the server into making arbitrary HTTP requests to internal or external systems. This can lead to unauthorized information disclosure, as the server may access sensitive internal resources or metadata endpoints that are not directly accessible to the attacker. The SSRF flaw does not require authentication or user interaction, increasing the risk of exploitation. At the time of publication, no patch or workaround is available, leaving affected systems exposed. Although no known exploits have been reported in the wild, the vulnerability's presence in a widely used Spring Cloud discovery tool means it could be leveraged in targeted attacks against microservices architectures that rely on Nepxion Discovery for service registration and routing. The vulnerability is classified under CWE-918, which covers SSRF issues where an attacker can abuse server functionality to make HTTP requests to unintended locations.

Potential Impact

For European organizations, the impact of this SSRF vulnerability can be significant, especially for enterprises and service providers that utilize Spring Cloud microservices with Nepxion Discovery for service orchestration. Exploitation could allow attackers to access internal-only services, cloud metadata endpoints, or other protected resources, potentially leading to leakage of sensitive configuration data, credentials, or internal network topology. This could facilitate further lateral movement, privilege escalation, or data exfiltration within corporate networks. The vulnerability undermines confidentiality and integrity by exposing internal information and possibly enabling attackers to influence backend service behavior indirectly. Availability impact is limited but could occur if attackers use SSRF to trigger resource exhaustion or denial-of-service conditions on internal services. Given the lack of patches and workarounds, organizations face an elevated risk until remediation is available. The medium severity rating reflects the moderate difficulty of exploitation balanced against the potential for impactful information disclosure.

Mitigation Recommendations

Given the absence of an official patch or workaround, European organizations should implement several practical mitigations: 1) Restrict network egress from servers running Nepxion Discovery to only trusted destinations using firewall rules or network segmentation to limit SSRF impact. 2) Employ strict input validation and sanitization at the application layer to detect and block suspicious URL parameters before they reach the vulnerable component. 3) Monitor and log outgoing HTTP requests from the Discovery service to detect anomalous or unexpected destinations indicative of SSRF exploitation attempts. 4) Use Web Application Firewalls (WAFs) with custom rules to identify and block SSRF attack patterns targeting the Discovery endpoints. 5) Isolate the Discovery service in a hardened environment with minimal privileges and no direct access to sensitive internal resources or cloud metadata services. 6) Engage with Nepxion or community channels to track patch releases and plan prompt updates once available. 7) Conduct internal penetration testing and code reviews focusing on SSRF vectors in the microservices ecosystem to identify and remediate similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-01-19T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf688b

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 11:44:10 PM

Last updated: 3/26/2026, 9:38:58 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses