All,

Thanks to Ivet, we have an advisory published here now: 
https://blogs.apache.org/cloudstack/entry/cloudstack-advisory-on-spring4shell-cve


Regards.

________________________________
From: Rohit Yadav <rohit.ya...@shapeblue.com>
Sent: Wednesday, April 13, 2022 22:06
To: dev@cloudstack.apache.org <dev@cloudstack.apache.org>; 
us...@cloudstack.apache.org <us...@cloudstack.apache.org>
Subject: [SHARE] CloudStack and Spring4Shell

All,

A new spring-framework RCE [1] and CVEs [2][3] have been announced, aka, 
Spring4Shell. The origin appears to be tracked to VMware products [2][3] and 
spring-framework has published new releases v5.3.18 and v5.2.20 [1] as 
mitigation.

CloudStack isn't deployed as a war and doesn't use Tomcat as the servlet 
container (it uses embedded Jetty and deployed as a uber-jar), further doesn't 
use spring-webmvc or spring-webflux directly per my investigation. Therefore, 
CloudStack is not affected [1] by Spring4Shell RCE and the CVEs.

However, as part of our routine maintenance and release effort, we have merged 
a pull request towards the next 4.17 LTS release (4.17.0.0 milestone) that 
upgrades our spring-framework dependency to the latest 5.3.18 version:
https://github.com/apache/cloudstack/pull/6250/files


[1] 
https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement#am-i-impacted

[2] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22963

[3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22965


Regards.




 

Reply via email to