Researchers have found a remote code execution 0-day vulnerability (dubbed Spring4Shell and SpringShell) in the Spring Core Java framework that allows unauthenticated remote code execution. A proof of concept was leaked for a short time on Github and although promptly removed, some were able to swiftly download it. It's been reposted on various platforms, making it available to the public.
Release : 14.3 RU4
This RCE 0-day vulnerability exists in the Spring Core with the JDK version greater than or equal to 9.0. It allows an unauthenticated attacker to execute arbitrary code on the target system. The Spring Framework is a popular Java platform that provides comprehensive infrastructure support for developing Java applications.
Symantec Security Response has published the following protections based on proof of concepts (POC).
File-based
Network-based
Policy-based
Note: Spring Framework versions 5.3.18 and 5.2.20, which address the vulnerability, are now available. Also temporary remediation steps were provided earlier by researchers at Praetorian.
Praetorian - Spring Core on JDK9+ is vulnerable to remote code execution
Symantec Protection Bulletins
Threat Alert: Spring4Shell (CVE-2022-22965) vulnerability
Symantec Security Advisory for Spring Framework CVE-2022-22965
Symantec Enterprise Blogs
Spring4Shell: New Zero-day RCE Vulnerability Uncovered in Java Framework
https://www.cyberkendra.com/2022/03/springshell-rce-0-day-vulnerability.html
https://www.praetorian.com/blog/spring-core-jdk9-rce/
https://www.bleepingcomputer.com/news/security/new-spring-java-framework-zero-day-allows-remote-code-execution/