FortiDAST
FortiDAST performs automated black-box dynamic application security testing of web applications to identify vulnerabilities that bad actors may exploit.
dmaciejak
Staff
Staff
Article Id 257346
Description

This article describes the Spring Data MongoDB SpEL expression injection vulnerability assessment with FortiDAST.

 

CVE-2022-22980 vulnerability was discovered in the Spring Data MongoDB application.

The vulnerability allows SpEL injection when using @Query or @Aggregation-annotated query methods with SpEL expressions that contain query parameter placeholders for value binding if the input is not sanitized that could lead to remote code execution.
Scope FortiDAST version 23.2.
Solution

Detection against that vulnerability is empowered by the FortiDAST Scripting Engine (FSE).

 

This technology enables FortiDAST to assess remotely with a high level of confidence if an asset is vulnerable to a specific vulnerability by testing the disarmed exploit against the asset itself.

 

To configure the scan, it will be necessary to enable the FSE group signature 'mongodb' which will select the underlying script: 'CVE-2022-22980 Spring Data MongoDB SpEL Expression injection vulnerability through annotated repository query methods.

 

For reference, a step-by-step guide on how to configure FortiDAST to trigger FSE can be found on Fortinet’s blog:

https://www.fortinet.com/blog/business-and-technology/fortipentest-exploit-engine-a-new-security-ars...

Contributors