Applications using Spring Cloud Gateway are vulnerable to specifically crafted requests that could make an extra request on downstream services. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.5+, 2.2.x users should upgrade to 2.2.10.RELEASE or newer.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://tanzu.vmware.com/security/cve-2021-22051 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2024-08-03T18:30:23.942Z
Reserved: 2021-01-04T00:00:00
Link: CVE-2021-22051

No data.

Status : Modified
Published: 2021-11-08T14:15:07.860
Modified: 2024-11-21T05:49:30.320
Link: CVE-2021-22051

No data.