[ https://issues.apache.org/jira/browse/HUDI-3819?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17520967#comment-17520967 ]
Sagar Sumit commented on HUDI-3819: ----------------------------------- These are the prerequisites for the exploit: * JDK 9 or higher * Apache Tomcat as the Servlet container * Packaged as WAR * spring-webmvc or spring-webflux dependency Should we treat it as blocker given that we don't officially support JDK 9 or higher? Moreover, the vulnerability has not been patched in spring-shell yet, the latest artifact is still 1.2.0.RELEASE; [https://mvnrepository.com/artifact/org.springframework.shell/spring-shell] And even the OSS release version is 2.0.1 which is about 4 years old: [https://github.com/spring-projects/spring-shell/releases/tag/v2.0.1.RELEASE] so building from source wouldn't help much. At best, we can try to exclude spring-core from spring-shell and add the latest spring-core explicitly as a compile-time dependency. But, it could throw up some compatibility issues. I'll give it a try. However, imo, we can wait until there is an official patched spring-shell artifact available. > upgrade spring cve-2022-22965 > ----------------------------- > > Key: HUDI-3819 > URL: https://issues.apache.org/jira/browse/HUDI-3819 > Project: Apache Hudi > Issue Type: Bug > Components: cli > Affects Versions: 0.9.0, 0.10.1 > Reporter: Jason-Morries Adam > Assignee: Sagar Sumit > Priority: Blocker > Fix For: 0.11.0 > > > We should upgrade the Spring Framework version at Hudi CLI because of > cve-2022-22965. The Qualys Scanner finds these packages and raises a warning > because of the existence of these files on the system. > The found files are: > /usr/lib/hudi/cli/lib/spring-beans-4.2.4.RELEASE.jar > /usr/lib/hudi/cli/lib/spring-core-4.2.4.RELEASE.jar > More Information: > Spring Framework: https://spring.io/projects/spring-framework > Spring project spring-framework release notes: > https://github.com/spring-projects/spring-framework/releases > CVE-2022-22965: https://tanzu.vmware.com/security/cve-2022-22965 -- This message was sent by Atlassian Jira (v8.20.1#820001)