-
Notifications
You must be signed in to change notification settings - Fork 1.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Spring Framework RCE via Data Binding on JDK 9+:CVE-2022-22965 #7817
Comments
If you are using Java 9+, why are you not using Jetty 10+? (which is designed for the post Java 8 runtime world we live in now) Jetty 9.x only exists for those users that are stuck on Java 8. |
if we use jetty9.x on Java 8,Does not involve this bug ? |
please read the announcement from vmware here https://tanzu.vmware.com/security/cve-2022-22965
|
For you to be impacted by CVE-2022-22965, all of the following must be true.
To break this down in terms for Jetty ... Nothing in Jetty uses spring-mvc or spring-webflux. (point 1) |
@joakime , thanks a lot for analysing in details for jetty 9.x users world |
Jetty version(s)
9.4.43.v20210629
Java version/vendor
(use: java -version)
jdk 1.9
OS type/version
linux
Description
Do not report security issues here! See Jetty Security Reports.
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
These are the prerequisites for the exploit:
JDK 9 or higher
Apache Tomcat as the Servlet container
Packaged as WAR
spring-webmvc or spring-webflux dependency
How to reproduce?
we find Jetty - Java HTTP Servlet Server has depends spring-beans in jetty-spring,
if we have plan to fix it?
The text was updated successfully, but these errors were encountered: