QID 376533

Date Published: 2022-04-14

QID 376533: Spring Framework Denial of Service (DoS) Vulnerability

The vulnerability exists in the Spring Framework, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.
Vulnerable Versions:
Spring framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19, and older are vulnerable.
QID Detection: (Authenticated) - Linux
Detection logic executes locate -b -e -r '^spring\-core.*\.jar$' command, ls -l /proc/*/fd | grep -Eo '\S+\/spring\S+jar' | uniq 2> /dev/null and checks if the spring-core-*.jar present on the system.

QID Detection: (Authenticated) - Windows
On Windows system, the QID identifies vulnerable instance of Spring via WMI to check spring-core is included in the running processes via command-line

QID Detection: (Authenticated) - MacOS
Detection logic executes locate command to check the presence of spring-core jar files on a system.

Successful exploitation of this vulnerability may allow an privileged attacker to execute a specially crafted SpEL expression that may cause a denial of service condition.

  • CVSS V3 rated as High - 6.5 severity.
  • CVSS V2 rated as Medium - 4 severity.
  • Solution
    The vendor has released an advisory to resolve these issues.

    Customers are advised to visit Spring Framework Advisory for more information on this.

    Vendor References

    CVEs related to QID 376533

    Software Advisories
    Advisory ID Software Component Link
    Spring Framework Advisory URL Logo tanzu.vmware.com/security/cve-2022-22950