Researchers have found a remote code execution 0-day vulnerability (dubbed Spring4Shell and SpringShell) in the Spring Core Java framework that allows unauthenticated remote code execution. A proof of concept was leaked for a short time on Github and although promptly removed, some were able to swiftly download it. It's been reposted on various platforms, making it available to the public.
Release : 14.3 RU4
This RCE 0-day vulnerability exists in the Spring Core with the JDK version greater than or equal to 9.0. It allows an unauthenticated attacker to execute arbitrary code on the target system. The Spring Framework is a popular Java platform that provides comprehensive infrastructure support for developing Java applications.
Symantec Security Response has published the following protections based on proof of concepts (POC).
Note: Spring Framework versions 5.3.18 and 5.2.20, which address the vulnerability, are now available. Also temporary remediation steps were provided earlier by researchers at Praetorian.
Symantec Protection Bulletins
Threat Alert: Spring4Shell (CVE-2022-22965) vulnerability
Symantec Enterprise Blogs
Spring4Shell: New Zero-day RCE Vulnerability Uncovered in Java Framework