Spinnaker Echo Service Vulnerable to Spring Expression Language Injection
Unrestricted access to the JVM via Spring Expression Language (SPeL) in Spinnaker's Echo service allows for arbitrary code execution, enabling attackers to invoke commands and access files.
Spinnaker is an open-source, multi-cloud continuous delivery platform. The Echo service, like other services within Spinnaker, utilizes Spring Expression Language (SPeL) for processing information, specifically concerning expected artifacts. However, versions prior to 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2 did not restrict the context of SPeL to a set of trusted classes, granting full JVM access, unlike Orca. This unrestricted access enables a user to leverage arbitrary Java classes, facilitating deep system access. This vulnerability allows attackers to execute arbitrary commands, access sensitive files, and potentially compromise the entire Spinnaker environment. Defenders should upgrade to patched versions or disable the Echo service as a workaround to mitigate this critical risk.
Attack Chain
- An attacker crafts a malicious payload containing a SpEL expression.
- This payload is submitted to the Echo service via a network request, likely through a specifically crafted API call involving expected artifacts.
- The Echo service processes the request and evaluates the malicious SpEL expression without proper context restrictions.
- The SpEL expression leverages Java classes to bypass security controls and gain access to underlying system resources.
- The attacker uses the unrestricted JVM access to execute arbitrary commands on the server.
- Successful command execution allows the attacker to read and write files on the system.
- The attacker leverages file access to obtain sensitive information such as credentials or configuration files.
- The attacker uses the compromised system to move laterally within the Spinnaker environment or target connected cloud resources. The final objective is likely complete control over the Spinnaker deployment and its connected infrastructure.
Impact
Successful exploitation of this vulnerability allows for arbitrary code execution on the Spinnaker server. This can lead to complete system compromise, allowing attackers to steal sensitive data, disrupt continuous delivery pipelines, and potentially gain access to connected cloud environments. Due to the critical nature of Spinnaker in managing deployments, a successful attack could severely impact an organization’s ability to deploy and maintain applications, potentially leading to significant financial and reputational damage.
Recommendation
- Upgrade Spinnaker instances to versions 2026.1.0, 2026.0.1, 2025.4.2, or 2025.3.2 to patch CVE-2026-32613.
- As a temporary workaround, disable the Echo service entirely until the upgrade can be performed, referencing the vendor documentation for disabling specific Spinnaker services.
- Monitor web server logs for unusual HTTP requests to the Echo service endpoints, specifically looking for suspicious patterns or attempts to inject SpEL expressions, using the Sigma rule provided below.
Detection coverage 2
Detect Spinnaker Echo SpEL Injection Attempts via Web Logs
highDetects potential SpEL injection attempts in Spinnaker Echo service by monitoring web server logs for suspicious patterns in HTTP requests.
Detect Spinnaker Echo SpEL Injection via POST Request
highDetects potential SpEL injection attempts in Spinnaker Echo service POST requests by monitoring web server logs for suspicious patterns in HTTP request bodies.
Detection queries are kept inside the platform. Get full rules →