{"uuid": "7def34c5-9d6e-4c0b-8c28-db45d12e3275", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-22113", "type": "seen", "source": "https://t.me/cibsecurity/24012", "content": "\u203c CVE-2021-22113 \u203c\n\nApplications using the \u00e2\u20ac&oelig;Sensitive Headers\u00e2\u20ac\ufffd functionality in Spring Cloud Netflix Zuul 2.2.6.RELEASE and below may be vulnerable to bypassing the \u00e2\u20ac&oelig;Sensitive Headers\u00e2\u20ac\ufffd restriction when executing requests with specially constructed URLs. Applications that use Spring Security's StrictHttpFirewall (enabled by default for all URLs) are not affected by the vulnerability, as they reject requests that allow bypassing.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-23T20:35:28.000000Z"}