Spring4Shell ZERO-day exploit CVE-2022-22963 and CVE-2022-22965 vulnerability for ITMS and/or GSS products
search cancel

Spring4Shell ZERO-day exploit CVE-2022-22963 and CVE-2022-22965 vulnerability for ITMS and/or GSS products

book

Article ID: 238587

calendar_today

Updated On: 10-17-2024

Products

IT Management Suite Server Management Suite Client Management Suite Ghost Solution Suite

Issue/Introduction

Two CVE’s for New Spring4Shell Zero-Day Vulnerability:

- CVE-2022-22963: Remote code execution in Spring Cloud Function by malicious Spring Expression

https://tanzu.vmware.com/security/cve-2022-22963

 - CVE-2022-22965: Spring Framework RCE via Data Binding on JDK 9+

https://tanzu.vmware.com/security/cve-2022-22965

 

Is ITMS and/or GSS impacted by this vulnerability?

Environment

ITMS 8.5, 8.6

Cause

The vulnerability impacts Spring MVC and Spring WebFlux applications running on JDK 9+. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

Resolution

No. ITMS and/or GSS do NOT have a dependency on the affected versions. See the Broadcom Security Advisory:

https://support.broadcom.com/external/content/SecurityAdvisories/0/20427

CVE-2022-22963: 

This vulnerability is exploited by the use of Spring Cloud Function. ITMS and/or GSS does not use Spring Cloud Function. 

CVE-2022-22965: 

There are a couple of prerequisites for exploiting this vulnerability. One of those prerequisites is using JDK9+. ITMS and/or GSS does not support/use JDK9+.