<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IDCard - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/idcard/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/idcard/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 20 May 2022 17:01:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>IDCard - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/idcard/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Identity card of the Spring4Shell vulnerability by CERT-W</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/04/identity-card-of-the-spring4shell-vulnerability-by-cert-w/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/04/identity-card-of-the-spring4shell-vulnerability-by-cert-w/#respond</comments>
		
		<dc:creator><![CDATA[Jean Marsault]]></dc:creator>
		<pubDate>Tue, 12 Apr 2022 17:32:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[EthicalHacking]]></category>
		<category><![CDATA[IDCard]]></category>
		<category><![CDATA[Sping4Shell]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17942</guid>

					<description><![CDATA[<p>    Overview Spring is a lightweight opensource application framework for Java. It allows for easy development and testing of Java applications. Spring is used to create Java enterprise applications. It provides means to build applications and supports different scenarios....</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/04/identity-card-of-the-spring4shell-vulnerability-by-cert-w/">Identity card of the Spring4Shell vulnerability by CERT-W</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p> </p>
<p> </p>
<h1>Overview</h1>
<p>Spring is <b>a lightweight opensource application framework for Java</b>. It allows for easy development and testing of Java applications. <br />Spring is used to create Java enterprise applications. It provides means to build applications and supports different scenarios. <br />A new vulnerability was found in Spring Core leading to a <b>Remote Code Execution</b>.</p>
<p>On March 31st, a CVE was released: <b>Spring4Shell</b> (<a href="https://tanzu.vmware.com/security/cve-2022-22965">CVE-2022-22965</a>)</p>
<p><img fetchpriority="high" decoding="async" class=" wp-image-17724 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2sping.png" alt="" width="719" height="405" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2sping.png 1147w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2sping-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2sping-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2sping-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2sping-800x450.png 800w" sizes="(max-width: 719px) 100vw, 719px" /></p>
<h1>Exploitability</h1>
<h2><b>Prerequisites</b></h2>
<p>/ JDK9.0 or higher</p>
<p>/ Spring Framework <b>5.3.0 to 5.3.17 </b>or <b>5.2.0 to 5.2.19</b> &amp; older versions</p>
<p>/ Apache Tomcat as the servlet container</p>
<p>/ <i>Spring-</i><i>webmvc</i> or <i>spring-</i><i>web</i><i>flux</i> dependency</p>
<p>/ Packaged as a traditional WAR</p>
<h2 style="text-align: left;"><b>Risks </b></h2>
<p>Once all prerequisites are met, the Spring4Shell exploit allows for <b>unauthenticated Remote Code Execution on the vulnerable host</b>. This initial access may lead to further harmful infection steps by attackers.</p>
<p>A list of applications and vendors that have published a statement indicating if their product was affected is available:</p>
<p><a href="https://www.kb.cert.org/vuls/id/970766">https://www.kb.cert.org/vuls/id/970766</a></p>
<h2 style="text-align: left;"><b>Difficulty</b></h2>
<p>Many researchers are still sceptical as to how achievable this exploit is. It is now clear that due to the heavy prerequisites of the exploit, it should occur in <b>fewer cases than the Log4Shell exploit</b>. However, <b>once the prerequisites are met, </b>exploiting the vulnerability <b>is pretty straightforward </b>and<b> has fewer constraints </b>than Log4Shell (egress traffic is not needed).</p>
<h2 style="text-align: left;"><b>Real-world examples</b></h2>
<p>Some real-world examples meet the prerequisites. Some researchers have found that the <a href="https://spring.io/guides/gs/handling-form-submission/">Handling Form submission sample code</a> <b>provided by Spring in one of their tutorials </b>is vulnerable to the Spring4Shell exploit.</p>
<h1>Mitigations</h1>
<h2><b>Main recommendation: </b><span style="color: #800080;"><u><b>Update applications to Spring Framework 5.3.18 or 5.2.20 if possible</b></u></span></h2>
<h2><b>Manual workaround:</b></h2>
<p>This section is <b>applicable only if it is not possible to update the applications </b>as mentioned above.</p>
<p>A temporary fix may be manually applied to mitigate the possibility of the Spring4Shell exploit: the following class must be created under the project package of the application system. After making sure the class is loaded by Spring, the <b>project must be recompiled</b>. This workaround only works against exploits known at this time, it’s <b>effectiveness may not be guaranteed in the long term</b>.</p>
<p><img decoding="async" class="size-full wp-image-17817 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image5.png" alt="" width="1858" height="285" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image5.png 1858w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image5-437x67.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image5-71x11.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image5-768x118.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image5-1536x236.png 1536w" sizes="(max-width: 1858px) 100vw, 1858px" /></p>
<h2 style="text-align: left;"><b>Good practice:</b></h2>
<p><img decoding="async" class="wp-image-17745 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/goodpract-1.png" alt="" width="274" height="319" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/goodpract-1.png 425w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/goodpract-1-164x191.png 164w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/goodpract-1-33x39.png 33w" sizes="(max-width: 274px) 100vw, 274px" /></p>
<h2 style="text-align: left;"><b>Point of attention:</b></h2>
<p><span style="color: #800080;">The Spring4Shell exploit only provides command execution on the vulnerable host:</span> it allows for initial access on a server exposed to the Internet. Commands will be executed in the context of the running application. A healthy, up-to-date infrastructure, as well as a good application of the least privilege principle, may greatly mitigate Spring4Shell’s impact.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17747" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/all-java-app.png" alt="" width="1894" height="82" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/all-java-app.png 1894w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/all-java-app-437x19.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/all-java-app-71x3.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/all-java-app-768x33.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/all-java-app-1536x67.png 1536w" sizes="auto, (max-width: 1894px) 100vw, 1894px" /></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/04/identity-card-of-the-spring4shell-vulnerability-by-cert-w/">Identity card of the Spring4Shell vulnerability by CERT-W</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/04/identity-card-of-the-spring4shell-vulnerability-by-cert-w/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
