如果说我上一篇文章中介绍的spring-cloud-function的rce还在我的理解范围之内,那么cve-2022-22965已经超出我的理解范围了。也许未来的某一天我有兴趣研究它,但是现在我完全不了解它。
只能摘抄一下
CVE-2022-22965: Spring Framework RCE via Data Binding on JDK 9+
Severity
High
Vendor
Spring by VMware
Description
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
These are the prerequisites for the exploit:
JDK 9 or higher
Apache Tomcat as the Servlet container
Packaged as WAR
spring-webmvc or spring-webflux dependency
Affected VMware Products and Versions
Severity is high unless otherwise noted.
Spring Framework
5.3.0 to 5.3.17
5.2.0 to 5.2.19
Older, unsupported versions are also affected
Mitigation
This vulnerability was responsibly reported to VMware by codeplutos, meizjm3i of AntGroup FG Security Lab. A secondary report was also received from Praetorian.
References
https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement
History
2022-03-31: Initial vulnerability report published.