9.8

CVE-2022-22965

Warnung
Exploit

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
VMwareSpring Framework Version < 5.2.20
   OracleJdk Version >= 9
VMwareSpring Framework Version >= 5.3.0 < 5.3.18
   OracleJdk Version >= 9
CiscoCx Cloud Agent Version < 2.1.0
OracleMysql Enterprise Monitor Version < 8.0.29
OracleSd-wan Edge Version9.0
OracleSd-wan Edge Version9.1
SiemensOperation Scheduler Version < 2.0.4
SiemensSipass Integrated Version2.80
SiemensSipass Integrated Version2.85
SiemensSiveillance Identity Version1.5
SiemensSiveillance Identity Version1.6
VeritasAccess Appliance Version7.4.3
VeritasAccess Appliance Version7.4.3.100
VeritasAccess Appliance Version7.4.3.200
VeritasAccess Appliance Version7.4.3
VeritasAccess Appliance Version7.4.3.100
VeritasAccess Appliance Version7.4.3.200
VeritasFlex Appliance Version1.3
VeritasFlex Appliance Version2.0
VeritasFlex Appliance Version2.0.1
VeritasFlex Appliance Version2.0.2
VeritasFlex Appliance Version2.1
VeritasNetbackup Appliance Version4.0
VeritasNetbackup Appliance Version4.0.0.1 Updatemaintenance_release1
VeritasNetbackup Appliance Version4.0.0.1 Updatemaintenance_release2
VeritasNetbackup Appliance Version4.0.0.1 Updatemaintenance_release3
VeritasNetbackup Appliance Version4.1
VeritasNetbackup Appliance Version4.1.0.1 Updatemaintenance_release1
VeritasNetbackup Appliance Version4.1.0.1 Updatemaintenance_release2
VeritasNetbackup Virtual Appliance Version4.0.0.1 Updatemaintenance_release1
VeritasNetbackup Virtual Appliance Version4.0.0.1 Updatemaintenance_release2
VeritasNetbackup Virtual Appliance Version4.0.0.1 Updatemaintenance_release3
VeritasNetbackup Virtual Appliance Version4.1.0.1 Updatemaintenance_release1
VeritasNetbackup Virtual Appliance Version4.1.0.1 Updatemaintenance_release2
SiemensOperation Scheduler Version < 2.0.4
SiemensSipass Integrated Version2.80
SiemensSipass Integrated Version2.85
SiemensSiveillance Identity Version1.5
SiemensSiveillance Identity Version1.6
OracleCommerce Platform Version11.3.2
OracleRetail Financial Integration Version14.1.3.2
OracleRetail Financial Integration Version15.0.3.1
OracleRetail Integration Bus Version14.1.3.2
OracleRetail Integration Bus Version15.0.3.1
OracleRetail Integration Bus Version16.0.3
OracleRetail Integration Bus Version19.0.1
OracleWeblogic Server Version12.2.1.3.0
OracleWeblogic Server Version12.2.1.4.0
OracleWeblogic Server Version14.1.1.0.0

04.04.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Spring Framework JDK 9+ Remote Code Execution Vulnerability

Schwachstelle

Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 94.44% 1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.