www.darkreading.com
Open in
urlscan Pro
2606:4700::6811:7563
Public Scan
URL:
https://www.darkreading.com/vulnerabilities-threats/spring-fixes-zero-day-vulnerability-in-framework-spring-boot
Submission: On April 11 via api from US — Scanned from DE
Submission: On April 11 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Remote Workforce Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat USA - August 6-11 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More Webinars * Protecting Industrial Control Systems from Modern Threats Apr 13, 2022 * Network Security Approaches for a Multi-Cloud, Hybrid IT World Apr 14, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Darktrace > Subscribe Login / Register The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Remote Workforce Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat USA - August 6-11 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More Webinars * Protecting Industrial Control Systems from Modern Threats Apr 13, 2022 * Network Security Approaches for a Multi-Cloud, Hybrid IT World Apr 14, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Darktrace > The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Remote Workforce Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat USA - August 6-11 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More Webinars * Protecting Industrial Control Systems from Modern Threats Apr 13, 2022 * Network Security Approaches for a Multi-Cloud, Hybrid IT World Apr 14, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Darktrace > -------------------------------------------------------------------------------- Subscribe Login / Register SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. 3. 4. Event Incorporating a Prevention Mindset into Threat Detection and Response | April 27 Webinar | <REGISTER NOW> Event PAM for the Extended Enterprise | April 19 Webinar | <REGISTER NOW> Event Network Security Approaches for a Multi-Cloud, Hybrid IT World | April 14 Webinar | <REGISTER NOW> Event Protecting Industrial Control Systems from Modern Threats | April 13 Webinar | <REGISTER NOW> PreviousNext Vulnerabilities/Threats 4 min read article SPRING FIXES ZERO-DAY VULNERABILITY IN FRAMEWORK AND SPRING BOOT The exploit requires a specific nonstandard configuration to work, limiting the danger it poses, but future research could turn up more broadly usable attacks. Robert Lemos Contributing Writer March 31, 2022 JV Photo via Alamy PDF The Spring development team today acknowledged the newly reported SpringShell, also called Spring4Shell, vulnerability, releasing new versions of the Spring Framework and Spring Boot to fix the root cause of the issue in the popular Java frameworks. The vulnerability — issued the Common Vulnerabilities and Exposures (CVE) identifier CVE-2022-22965 — affects applications that use Spring MVC, a framework implementing the model-view-controller architecture for Web applications, and Spring WebFlux, if they run on version 9.0 or higher of the Java Development Kit, according to an advisory the Spring developers issued. The current exploit for the issue, however, is somewhat limited, as it requires that the application is deployed as a specific type of file — a Web Archive (WAR) file — on Apache Tomcat, rather than the standard deployment method of a Spring Boot executable in the Java Archive (JAR) format. However, as more security researchers examine the code and search for additional paths through which to exploit the vulnerability, that could change, Spring committer Rossen Stoyanchev warned in the advisory./p> "The nature of the vulnerability is more general, and there may be other ways to exploit it," he said. Time to Patch Spring Apps Companies should prioritize patching all of their Spring Framework- and Spring Boot-based applications, even if they do not run the specific, known-vulnerable configurations, security experts say. Development teams often do not know their full software bill-of-materials (SBOM), which could leave them unaware of potentially vulnerable configurations. In addition, these sorts of vulnerabilities tend to "mutate over time as researchers look for other avenues of exploitation," says Ilkka Turunen, field CTO at software management and security firm Sonatype. "What is very typical in a situation like this — just look back three months at Log4j — there is a ton of attention being cast on the issue, both good and bad, researchers thinking about the exploitable classes," he says. "However, that quickly evolves. In Log4j we found four other CVEs come out related to the original issue, and we expect that to happen here." The Spring developers first learned of the vulnerability on Tuesday, March 29, but the details of the issues leaked out before the development team had finished the patch and disclosure, Spring's Stoyanchev stated in the Spring advisory. "On Wednesday we worked through investigation, analysis, identifying a fix, testing, while aiming for emergency releases on Thursday," he said. "In the mean time, also on Wednesday, details were leaked in full detail online, which is why we are providing this update ahead of the releases and the CVE report." Figuring out whether a company's Spring-based applications are vulnerable will be difficult for most companies, as this is "a particularly tricky vulnerability," Edward Wu, senior principal data scientist for ExtraHop, a cloud cybersecurity firm, said in a statement sent to Dark Reading. "Most teams have hundreds of vendor-provided software in their environments that may or may not be running Spring Core," he says. "They often don’t have access to the source code and will struggle to determine if they’re vulnerable. It will be important for organizations to be able to query their environment but also track activity within their network as a single source of truth." Not the Next Log4j Overall, however, the vulnerability in Spring falls short of the Log4Shell exploit for the critical vulnerability in Log4j, even though some companies have placed the two issues on the same level, Dan Murphy, distinguished architect at application security provider Invicti, said in a statement. Spring4Shell, as some companies have named the vulnerability, relies on a configuration that is not the default for modern Spring applications, he said. If a company runs their Spring Boot apps as a standalone application, then they are likely not vulnerable. "While the Spring4Shell vulnerability is serious and absolutely needs patching, our initial findings indicate it won't be the next Log4Shell incident," Murphy said. "That said, organizations should still follow standard best practices and make a plan to patch. The underlying issue is still present and could potentially be exploited in as-yet-undiscovered ways." On Wednesday, several security researchers had confused the new exploit with information circulating around a second vulnerability that had been disclosed the prior day. The vulnerability, CVE-2022-22963, affects the Spring Cloud Function library, but also had been assigned the wrong severity. The Spring development team upgraded that vulnerability's severity to "Critical" on March 31. CloudApplication SecurityVulnerability Management Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe More Insights White Papers * Improving Operations with AI-Assisted Cybersecurity * Unlocking Human Potential in SOC Teams With AI-Assisted Cybersecurity More White Papers Webinars * Protecting Industrial Control Systems from Modern Threats * Network Security Approaches for a Multi-Cloud, Hybrid IT World More Webinars Reports * Rethinking Endpoint Security in a Pandemic and Beyond * How Enterprises Are Securing the Application Environment More Reports Editors' Choice 6 Reasons Not to Pay Ransomware Attackers Jai Vijayan, Contributing Writer Zero-Day Vulnerability Discovered in Java Spring Framework Robert Lemos, Contributing Writer HR Alone Can't Solve the Great Resignation Ashley Gaare, President, SoftwareONE North America Log4j Attacks Continue Unabated Against VMware Horizon Servers Jai Vijayan, Contributing Writer Webinars * Protecting Industrial Control Systems from Modern Threats * Network Security Approaches for a Multi-Cloud, Hybrid IT World * Building and Maintaining an Effective IoT Cybersecurity Strategy * Building Security Into the Application Development Lifecycle * The ROI Story: Identifying & Justifying Disruptive Technology More Webinars White Papers * Improving Operations with AI-Assisted Cybersecurity * Unlocking Human Potential in SOC Teams With AI-Assisted Cybersecurity * Quantifying the Gap Between Perceived Security and Comprehensive MITRE ATT&CK Coverage * The Cyber Threat Impact of COVID-19 to Global Business * Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report More White Papers Events * Black Hat USA - August 6-11 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV More Events More Insights White Papers * Improving Operations with AI-Assisted Cybersecurity * Unlocking Human Potential in SOC Teams With AI-Assisted Cybersecurity More White Papers Webinars * Protecting Industrial Control Systems from Modern Threats * Network Security Approaches for a Multi-Cloud, Hybrid IT World More Webinars Reports * Rethinking Endpoint Security in a Pandemic and Beyond * How Enterprises Are Securing the Application Environment More Reports DISCOVER MORE FROM INFORMA TECH * Interop * InformationWeek * Network Computing * ITPro Today * Data Center Knowledge * Black Hat * Omdia WORKING WITH US * About Us * Advertise * Reprints FOLLOW DARK READING ON SOCIAL * * * * * Home * Cookies * Privacy * Terms Copyright © 2022 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. This site uses cookies to provide you with the best user experience possible. By using Dark Reading, you accept our use of cookies. Accept