SAP Knowledge Base Article - Preview

3193143 - Security vulnerability CVE-2022-22965 vulnerability SprngBoot/ Spring4Shell for SAP Customer Data Cloud

Symptom

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

These are the prerequisites for the exploit:

  • JDK 9 or higher
  • Apache Tomcat as the Servlet container
  • Packaged as WAR
  • spring-webmvc or spring-webflux dependency
Affected VMware Products and Versions

Severity is critical unless otherwise noted.

  • Spring Framework
    • 5.3.0 to 5.3.17
    • 5.2.0 to 5.2.19
    • Older, unsupported versions are also affected


Read more...

Environment

SAP Customer Data Cloud
SAP Customer Data Platform

Product

SAP Customer Data Cloud all versions

Keywords

Spring4Shell, Spring4, CVE-2022-22965 , KBA , CEC-PRO , SAP Customer Data Cloud - Identity, - Consent, - Profile , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.