Software
Service
Insights
Case & Story
Dev Platform
Sign In
Public Notices
Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965)
Apr 01, 2022 GMT+08: 00
1.Overview

On March 31, Spring officially announced a remote code execution vulnerability (CVE-2022-22965) in the Spring Framework environment running JDK 9 or higher. Attackers can exploit this vulnerability to enable arbitrary remote code execution. This vulnerability is easy to exploit. The POC/EXP of this vulnerability has been disclosed and the risk is high.

The Spring Framework is an open-source lightweight application framework developed for building complex web applications on top of the Java Enterprise Edition (EE) platform. If you are a Spring Framework user, check your system and implement timely security hardening.

Reference:

https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement

2.Severity

Severity: important

(Severity: low, moderate, important, and critical)

3.Affected Products

Affected versions:

Spring Framework 5.3.x < 5.3.18

Spring Framework 5.2.x < 5.2.20

Older versions may also be affected.

Secure versions:

Spring Framework 5.3.18

Spring Framework 5.3.18

Spring Framework 5.2.20

In order to exploit the vulnerability, the following requirements must be met:

Spring framework or derived frameworks run on JDK 9 or higher.

According to the vulnerability report, the requirements for the attack scenarios are as follows. However, the nature of the vulnerability is more general, and there may be other ways to exploit it that have not been reported yet.

1. JDK 9 or higher
2. Apache Tomcat as the Servlet container
3. Packaged as WAR
4. spring-webmvc or spring-webflux dependency
4.Vulnerability Handling

Currently, secure versions have been released. You are advised to upgrade Spring Framework to a secure version.

https://github.com/spring-projects/spring-framework/tags

5.Technical Support

Get more professional support at any time

Contact Us

Email:GlobalTechnicalService@iwhalecloud.com
Contact Us