cve-2022-22965是什么,一个至少超越我此刻理解力的漏洞

如果说我上一篇文章中介绍的spring-cloud-function的rce还在我的理解范围之内,那么cve-2022-22965已经超出我的理解范围了。也许未来的某一天我有兴趣研究它,但是现在我完全不了解它。

在这里插入图片描述
在这里插入图片描述

只能摘抄一下

CVE-2022-22965: Spring Framework RCE via Data Binding on JDK 9+

Severity
High

Vendor
Spring by VMware

Description
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

These are the prerequisites for the exploit:

JDK 9 or higher
Apache Tomcat as the Servlet container
Packaged as WAR
spring-webmvc or spring-webflux dependency
Affected VMware Products and Versions
Severity is high unless otherwise noted.

Spring Framework
5.3.0 to 5.3.17
5.2.0 to 5.2.19
Older, unsupported versions are also affected
Mitigation

This vulnerability was responsibly reported to VMware by codeplutos, meizjm3i of AntGroup FG Security Lab. A secondary report was also received from Praetorian.

References
https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement
History
2022-03-31: Initial vulnerability report published.

评论 5
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值