Two CVE’s for New Spring4Shell Zero-Day Vulnerability:
- CVE-2022-22963: Remote code execution in Spring Cloud Function by malicious Spring Expression
https://tanzu.vmware.com/security/cve-2022-22963
- CVE-2022-22965: Spring Framework RCE via Data Binding on JDK 9+
https://tanzu.vmware.com/security/cve-2022-22965
Is ITMS and/or GSS impacted by this vulnerability?
ITMS 8.5, 8.6
The vulnerability impacts Spring MVC and Spring WebFlux applications running on JDK 9+. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
No. ITMS and/or GSS do NOT have a dependency on the affected versions. See the Broadcom Security Advisory:
https://support.broadcom.com/external/content/SecurityAdvisories/0/20427
CVE-2022-22963:
This vulnerability is exploited by the use of Spring Cloud Function. ITMS and/or GSS does not use Spring Cloud Function.
CVE-2022-22965:
There are a couple of prerequisites for exploiting this vulnerability. One of those prerequisites is using JDK9+. ITMS and/or GSS does not support/use JDK9+.