search cancel

Spring4Shell ZERO-day exploit CVE-2022-22963 and CVE-2022-22965 vulnerability for ITMS and/or GSS products


Article ID: 238587


Updated On:


IT Management Suite Server Management Suite Client Management Suite Ghost Solution Suite


Two CVE’s for New Spring4Shell Zero-Day Vulnerability:

- CVE-2022-22963: Remote code execution in Spring Cloud Function by malicious Spring Expression

 - CVE-2022-22965: Spring Framework RCE via Data Binding on JDK 9+


Is ITMS and/or GSS impacted by this vulnerability?


The vulnerability impacts Spring MVC and Spring WebFlux applications running on JDK 9+. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.


ITMS 8.5, 8.6


No. ITMS and/or GSS do NOT have a dependency on the affected versions. See the Broadcom Security Advisory:


This vulnerability is exploited by the use of Spring Cloud Function. ITMS and/or GSS does not use Spring Cloud Function. 



There are a couple of prerequisites for exploiting this vulnerability. One of those prerequisites is using JDK9+. ITMS and/or GSS does not support/use JDK9+.