QID 984158

QID 984158: Java (maven) Security Update for org.springframework.boot:spring-boot-starter-webflux (GHSA-36p3-wjmg-h94x)

Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code execution vulnerability known as `Spring4Shell`. ## Impact A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. These are the prerequisites for the exploit: - JDK 9 or higher - Apache Tomcat as the Servlet container - Packaged as WAR - `spring-webmvc` or `spring-webflux` dependency ## Patches - Spring Framework [5.3.18](https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18) and [5.2.20](https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE) - Spring Boot [2.6.6](https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6) and [2.5.12](https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12) ## Workarounds For those who are unable to upgrade, leaked reports recommend setting `disallowedFields` on `WebDataBinder` through an `@ControllerAdvice`. This works generally, but as a centrally applied workaround fix, may leave some loopholes, in particular if a controller sets `disallowedFields` locally through its own `@InitBinder` method, which overrides the global setting. To apply the workaround in a more fail-safe way, applications could extend `RequestMappingHandlerAdapter` to update the `WebDataBinder` at the end after all other initialization. In order to do that, a Spring Boot application can declare a `WebMvcRegistrations` bean (Spring MVC) or a `WebFluxRegistrations` bean (Spring WebFlux).

Successful exploitation of this vulnerability may affect the confidentiality, integrity, and availability of the targeted user.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Customers are advised to refer to GHSA-36p3-wjmg-h94x for updates pertaining to this vulnerability.
    Vendor References

    CVEs related to QID 984158

    Software Advisories
    Advisory ID Software Component Link
    GHSA-36p3-wjmg-h94x org.springframework.boot:spring-boot-starter-web URL Logo github.com/advisories/GHSA-36p3-wjmg-h94x
    GHSA-36p3-wjmg-h94x org.springframework.boot:spring-boot-starter-webflux URL Logo github.com/advisories/GHSA-36p3-wjmg-h94x
    GHSA-36p3-wjmg-h94x org.springframework:spring-beans URL Logo github.com/advisories/GHSA-36p3-wjmg-h94x
    GHSA-36p3-wjmg-h94x org.springframework:spring-core URL Logo github.com/advisories/GHSA-36p3-wjmg-h94x
    GHSA-36p3-wjmg-h94x org.springframework:spring-webflux URL Logo github.com/advisories/GHSA-36p3-wjmg-h94x
    GHSA-36p3-wjmg-h94x org.springframework:spring-webmvc URL Logo github.com/advisories/GHSA-36p3-wjmg-h94x