Spring Core - Remote Code Execution (Spring4Shell - CVE-2022-22965) (CVE-2022-22965)
- Severity
- CVSSv3 Score
- 9.8
- Vulnerability description
Spring Core is affected by a Remote Code Execution,located on the web application deployed as a WAR. The root cause of this vulnerability is the insecure access to ClassLoader in Java 9+ which is used in Spring Framework and can be used for uploading a malicious webshell. Spring Framework is affected in versions below 5.2.20 or in version 5.3.18 and Spring Boot is affected in versions lower than 2.6.6.
- Risk description
The risk exists that a remote unauthenticated attacker can fully compromise the server in order to steal confidential information, install ransomware, or pivot to the internal network.
- Exploit capabilities
Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.
- Recommendation
Upgrade the Spring Framwork or Spring Boot to the newest version and check the newest Java security fix for versions higher or equal with 9.
- References
https://jfrog.com/blog/springshell-zero-day-vulnerability-all-you-need-to-know
https://www.lunasec.io/docs/blog/spring-rce-vulnerabilities/
- Codename
- Not available
- Detectable with
- Network Scanner
- Exploitable with Sniper
- Yes
- Vuln date
- Mar 2022
- Published at
- Updated at
- Software Type
- Web framework
- Vendor
- Pivotal Software
- Product
- Spring Framework