Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.114220
Category:Web application abuses
Title:VMware Spring Framework RCE Vulnerability (Spring4Shell, SpringShell) - Active Check
Summary:The VMware Spring Framework is prone to a remote code execution; (RCE) vulnerability dubbed 'Spring4Shell' or 'SpringShell'.
Description:Summary:
The VMware Spring Framework is prone to a remote code execution
(RCE) vulnerability dubbed 'Spring4Shell' or 'SpringShell'.

Vulnerability Insight:
A Spring MVC or Spring WebFlux application running on JDK 9+ may
be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the
application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot
executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the
vulnerability is more general, and there may be other ways to exploit it.

Affected Software/OS:
VMware Spring Framework versions prior to 5.2.20 and 5.3.x
prior to 5.3.18.

The following are the requirements for an environment to be affected to this specific
vulnerability:

- Running on JDK 9 or higher

- Apache Tomcat as the Servlet container

- Packaged as a traditional WAR and deployed in a standalone Tomcat instance. Typical Spring Boot
deployments using an embedded Servlet container or reactive web server are not impacted.

- spring-webmvc or spring-webflux dependency

- an affected version of the Spring Framework

Solution:
Update to version 5.2.20, 5.3.18 or later.

Possible mitigations without doing an update:

- Upgrading Tomcat (10.0.20, 9.0.62 or 8.5.78 hardened the class loader to provide a mitigation)

- Downgrading to Java 8

- Disallowed Fields

Please see the references for more information on these mitigation possibilities.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2022-22965
Cisco Security Advisory: 20220401 Vulnerability in Spring Framework Affecting Cisco Products: March 2022
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67
https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005
http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html
http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html
https://tanzu.vmware.com/security/cve-2022-22965
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.