Symptom
You are curious whether your SAP Cloud Portal Services on Cloud Foundry & Neo Environment are being affected by Spring Core Remote Code Execution vulnerability exploited In the wild (SpringShell). See documentation: CVE-2022-22965.
- Vulnerability CVE-2022-22965
- How does this impact SAP Cloud Portal Service running on Cloud Foundry & Neo environment
Read more...
Environment
Affected Software and Versions / Existing proofs of concept (PoCs) for exploitation work under the following conditions:
- JDK 9 or higher
- Apache Tomcat as the Servlet container
- Packaged as a traditional WAR (in contrast to a Spring Boot executable jar)
- spring-webmvc or spring-webflux dependency
- Spring Framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19, and older versions
Product
Keywords
CVE-2022-22965, CPP, CF, NEO, SAP Cloud Portal Service, Spring Core Remote Code Execution, SpringShell , KBA , EP-WZ-SM , Site Directory, Site Settings, Site Service, IAS Integration , EP-CPP-NEO-SFC , Launchpad Site and SAP Fiori Cloud , Problem
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.