Remote Code Execution in Spring Framework
Critical severity
GitHub Reviewed
Published
Mar 31, 2022
to the GitHub Advisory Database
•
Updated Jan 31, 2023
Package
Affected versions
< 2.5.12
>= 2.6.0, < 2.6.6
Patched versions
2.5.12
2.6.6
< 2.5.12
>= 2.6.0, < 2.6.6
2.5.12
2.6.6
>= 5.3.0, < 5.3.18
< 5.2.20.RELEASE
5.3.18
5.2.20.RELEASE
Description
Published to the GitHub Advisory Database
Mar 31, 2022
Reviewed
Mar 31, 2022
Published by the National Vulnerability Database
Apr 1, 2022
Last updated
Jan 31, 2023
Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code execution vulnerability known as
Spring4Shell
.Impact
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
These are the prerequisites for the exploit:
spring-webmvc
orspring-webflux
dependencyPatches
Workarounds
For those who are unable to upgrade, leaked reports recommend setting
disallowedFields
onWebDataBinder
through an@ControllerAdvice
. This works generally, but as a centrally applied workaround fix, may leave some loopholes, in particular if a controller setsdisallowedFields
locally through its own@InitBinder
method, which overrides the global setting.To apply the workaround in a more fail-safe way, applications could extend
RequestMappingHandlerAdapter
to update theWebDataBinder
at the end after all other initialization. In order to do that, a Spring Boot application can declare aWebMvcRegistrations
bean (Spring MVC) or aWebFluxRegistrations
bean (Spring WebFlux).References