{"id":18632,"date":"2022-03-30T17:20:52","date_gmt":"2022-03-31T01:20:52","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/03\/30\/news-12365\/"},"modified":"2022-03-30T17:20:52","modified_gmt":"2022-03-31T01:20:52","slug":"news-12365","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/03\/30\/news-12365\/","title":{"rendered":"Second vulnerability in Spring Cloud casts shadow on popular Java framework"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/coffee-rain-luckakcul-image.jpg\"\/><\/p>\n<p><strong>Credit to Author: gallagherseanm| Date: Thu, 31 Mar 2022 00:28:07 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p><span data-contrast=\"auto\">A recently revealed vulnerability in some versions of <\/span><a href=\"https:\/\/spring.io\/projects\/spring-cloud\"><span data-contrast=\"none\">Spring Cloud<\/span><\/a><span data-contrast=\"auto\">, a component of the Spring framework for Java used as a component of cloud and web applications, is now being exploited by attackers to remotely execute code on servers running the framework.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\u00a0<\/span><a href=\"https:\/\/tanzu.vmware.com\/security\/cve-2022-22963\"><span data-contrast=\"none\">The vulnerability, CVE-2022-22963<\/span><\/a><span data-contrast=\"auto\">, was announced on March 29 \u2014 along with a <\/span><a href=\"https:\/\/spring.io\/blog\/2022\/03\/29\/cve-report-published-for-spring-cloud-function\"><span data-contrast=\"none\">corresponding updated release<\/span><\/a><span data-contrast=\"auto\"> of the framework.\u00a0 The disclosure comes on the heels of <\/span><a href=\"https:\/\/tanzu.vmware.com\/security\/cve-2022-22947\"><span data-contrast=\"none\">another remote code execution vulnerability (CVE-2022-22947) in Spring Cloud Gateway,<\/span><\/a><span data-contrast=\"auto\"> patched earlier in March. As <\/span><a href=\"https:\/\/nakedsecurity.sophos.com\/2022\/03\/30\/vmware-spring-cloud-java-bug-gives-instant-remote-code-execution-update-now\/\"><span data-contrast=\"none\">Sophos\u2019 Paul Ducklin reported<\/span><\/a><span data-contrast=\"auto\">, there are already proof-of-concept exploits for the new vulnerability (CVE-2022-22963) publicly available.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The exploit uses crafted web requests based on the Spring Expression Language (SpEL) to inject Java code as part of Spring Cloud Function requests. The proof-of-concept versions of the exploit demonstrate how to use the exploit to run malicious software remotely on the Spring Cloud server.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Anyone using affected versions of Spring Cloud Function should <\/span><a href=\"https:\/\/spring.io\/blog\/2022\/03\/29\/cve-report-published-for-spring-cloud-function\"><span data-contrast=\"none\">upgrade<\/span><\/a><span data-contrast=\"auto\"> to 3.1.7, 3.2.3.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">SophosLabs has released an IPS signature (<strong>XG: 2306<\/strong><\/span><strong>9<\/strong><span data-contrast=\"auto\"><strong>89<\/strong>) for endpoint and firewall devices (ID) to detect and block this vulnerability. We continue to investigate other claimed exploits of Spring Core, and will update this report as more details become available.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/03\/30\/second-vulnerability-in-spring-cloud-casts-shadow-on-popular-java-framework\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/coffee-rain-luckakcul-image.jpg\"\/><\/p>\n<p><strong>Credit to Author: gallagherseanm| Date: Thu, 31 Mar 2022 00:28:07 +0000<\/strong><\/p>\n<p>SophosLabs IPS signature available to detect and block issue under exploit<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[11146,9748,24552,25551,10467],"class_list":["post-18632","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-cloud-security","tag-java","tag-security-operations","tag-spring-cloud","tag-vulnerability"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18632"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18632\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18632"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}