Bug 2070348 (CVE-2022-22965, MI-2022-002)
Summary: | CVE-2022-22965 spring-framework: RCE via Data Binding on JDK 9+ | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Chess Hazlett <chazlett> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | adsoni, aileenc, alazarot, anstephe, ataylor, avibelli, bgeorges, chazlett, clement.escoffier, dandread, dkreling, drieden, emingora, etirelli, fhirtz, ggaughan, ggrzybek, gmalinko, gsmet, hamadhan, hbraun, ibek, janstey, jburrell, jnethert, jochrist, jrokos, jross, jstastny, jwon, kaycoth, krathod, kverlaen, lsurette, lthon, michal.skrivanek, mnovotny, mperina, mszynkie, pantinor, pdelbell, peholase, pgallagh, pjindal, probinso, rguimara, rkshirsa, rrajasek, rruss, rsvoboda, sbiarozk, sbonazzo, sdouglas, security-response-team, tmielke, tzimanyi, vkumar, vsroka, ymittal |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | spring-webmvc 5.2.20, spring-webmvc 5.3.18, spring-framework 5.2.20, spring-framework 5.3.18 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in Spring Framework, specifically within two modules called Spring MVC and Spring WebFlux, (transitively affected from Spring Beans), using parameter data binding. This flaw allows an attacker to pass specially-constructed malicious requests to certain parameters and possibly gain access to normally-restricted functionality within the Java Virtual Machine.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-04-13 16:57:35 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2070626, 2070675 | ||
Bug Blocks: | 2070180 |
Description
Chess Hazlett
2022-03-30 21:46:04 UTC
This issue has been addressed in the following products: CEQ 2.2.1-1 (CVE-2022-22965) Via RHSA-2022:1306 https://access.redhat.com/errata/RHSA-2022:1306 This issue has been addressed in the following products: RHINT Camel-K 1.6.5 Via RHSA-2022:1333 https://access.redhat.com/errata/RHSA-2022:1333 This issue has been addressed in the following products: Red Hat Fuse 7.10.2 Via RHSA-2022:1360 https://access.redhat.com/errata/RHSA-2022:1360 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-22965 This issue has been addressed in the following products: RHPAM 7.12.1 async Via RHSA-2022:1378 https://access.redhat.com/errata/RHSA-2022:1378 This issue has been addressed in the following products: RHDM 7.12.1 async Via RHSA-2022:1379 https://access.redhat.com/errata/RHSA-2022:1379 This issue has been addressed in the following products: Red Hat AMQ 7.8.6 Via RHSA-2022:1626 https://access.redhat.com/errata/RHSA-2022:1626 This issue has been addressed in the following products: Red Hat AMQ 7.9.4 Via RHSA-2022:1627 https://access.redhat.com/errata/RHSA-2022:1627 |