Security for everyone

CVE-2021-22053 Scanner

Detects 'Remote Code Execution (RCE)' vulnerability in Spring Cloud Netflix affects v. Spring Cloud Netflix 2.2.x prior to 2.2.10.Release + and old unsupported versions.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one


Parent Category

CVE-2021-22053 Scanner Detail

Spring Cloud Netflix is a set of tools that makes it easier to develop microservices that are cloud-native. It provides a range of useful features such as service discovery, load balancing, and circuit breaking. One of the key tools in the Spring Cloud Netflix suite is the Hystrix Dashboard, which provides a real-time view of your application's metrics. This can be invaluable in understanding how your application is performing and identifying any issues that need to be addressed.

The CVE-2021-22053 vulnerability is a critical security flaw that has been detected in the Spring Cloud Netflix Hystrix Dashboard. It is related to the way that user-provided data is evaluated as Spring Expression Language (SpEL) expressions in the view templates. An attacker could exploit this vulnerability by submitting crafted data in the URI path, leading to remote code execution on the server.

If this vulnerability is exploited, it can lead to disastrous consequences for your application. Depending on the attacker's intentions, they could potentially steal sensitive data, install malware, or even take control of the server. It is critical that this vulnerability is patched as soon as possible to avoid any such attacks.

Thanks to the pro features of the platform, those who read this article can easily and quickly learn about vulnerabilities in their digital assets. Our platform provides real-time threat intelligence and alerts when vulnerabilities are discovered, allowing you to take immediate action to protect your applications from attack. With, you can rest easy knowing that your digital assets are always secure.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture