Researchers have found a remote code execution 0-day vulnerability (dubbed Spring4Shell and SpringShell) in the Spring Core Java framework that allows unauthenticated remote code execution. A proof of concept was leaked for a short time on Github and although promptly removed, some were able to swiftly download it. It's been reposted on various platforms, making it available to the public.
This RCE 0-day vulnerability exists in the Spring Core with the JDK version greater than or equal to 9.0. It allows an unauthenticated attacker to execute arbitrary code on the target system. The Spring Framework is a popular Java platform that provides comprehensive infrastructure support for developing Java applications.
Release : 14.3 RU4
Symantec Security Response has published the following protections based on proof of concepts (POC).
Note: Spring Framework versions 5.3.18 and 5.2.20, which address the vulnerability, are now available. Also temporary remediations steps were provided earlier by researchers at Praetorian.
Praetorian - Spring Core on JDK9+ is vulnerable to remote code execution
Syamntec Protection Bullentins
Threat Alert: Spring4Shell (CVE-2022-22965) vulnerability
Symantec Security Advisory for Spring Framework CVE-2022-22965
Syamntec Enterprise Blogs
Spring4Shell: New Zero-day RCE Vulnerability Uncovered in Java Framework