SpringShell: Spring Core RCE 0-day Vulnerability
UPDATE: 4/2
Details of this vulnerability, along with a CVE, have now been published. We are actively investigating any impact resulting from this vulnerability across all of our products, and we will update this thread with information as we learn more.
UPDATE 3/31
Here are some FAQs on this vulnerability.
- What is Spring4Shell?
- Spring4Shell is the name given to a zero-day vulnerability in the Spring Core Framework, a programming and configuration model for Java-based enterprise applications.
- Has a CVE been assigned to this vulnerability?
- The CVE is CVE-2022-22965.
- Is there a patch available for Spring4Shell?
- As of today, March 31, Spring Framework versions 5.3.18 and 5.2.20 have been released. According to the vulnerability announcement from Spring, Spring Boot version 2.6.6 and 2.5.12 (both depend on Spring Framework 5.3.18) have been released.
- How severe is Spring4Shell?
- An attacker could exploit Spring4Shell by sending a specially crafted request to a vulnerable server. However, exploitation of Spring4Shell requires certain prerequisites.
- According to Spring, the following requirements were included in the vulnerability report, but this may not be a complete list of requirements:
- Java Development Kit (JDK) 9 or greater
- Apache Tomcat as the Servlet container
- Packaged as a WAR
- spring-webmvc or spring-webflux dependency
- What versions of Spring Core Framework are affected?
- As of March 31, Spring versions 5.3.18 and 5.2.20 have been released to address CVE-2022-22965.
- Affected VMware Products and Versions
- Severity is critical unless otherwise noted.
- Spring Framework
- 5.3.0 to 5.3.17
- 5.2.0 to 5.2.19
- Older, unsupported versions are also affected
- Are any Jamf products impacted by this vulnerability?
- We are actively investigating any impact this vulnerability poses to all Jamf products.
- Is there any action a Jamf customer should be taking to secure their Jamf environment?
- Not at this time
We will update this post with additional information as soon as we have it.
Aaron Kiemele
CISO, Jamf
