Skip to main content

Spring4Shell Vulnerability

12 April, 2022

Recently vulnerability named "Spring4Shell Vulnerability" is for apache servers, the behavior of the vulnerability is very generic, however, there may be other ways to exploit it.

These are the prerequisites for the exploit:

  • JDK 9 or higher
  • Apache Tomcat as the Servlet container
  • Packaged as WAR
  • spring-webmvc or spring-webflux dependency

Please refer to the below URL for more details:

Reference Articles

Recommended Action

There are updates out to mitigate this for both VMWare and the spring framework so machines that are up to date and vendors using the spring framework are updated should not be affected. We would recommend updating these applications to the latest versions.

We’ve written a script to detect the active apache and java ports running against localhost. We recommend running the scan on all machines in your environment over the next few days starting effectively in the next hour.

Procedure name: "Spring 4 Shell Apache Check" - It will be updating the custom field.

If nothing is found it will update the custom field with the status "Machine Safe". If it finds something it will update "Machine is theoretically vulnerable" as the documents suggest that it may not be comprehensive.

If the script is blocked by AV it will update "Log Missing" in the CF.

Known Issues

Unfortunately, the updating and mitigation cannot be scripted as it’s per-app. Our other customers are taking these applications offline or removing them.