[ 
https://issues.apache.org/jira/browse/AMQ-8612?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jean-Baptiste Onofré resolved AMQ-8612.
---------------------------------------
    Fix Version/s:     (was: 5.18.0)
       Resolution: Duplicate

Already updated to Spring 5.3.22

> Upgrade spring version to 5.3.20
> --------------------------------
>
>                 Key: AMQ-8612
>                 URL: https://issues.apache.org/jira/browse/AMQ-8612
>             Project: ActiveMQ
>          Issue Type: Dependency upgrade
>    Affects Versions: 5.17.1
>            Reporter: Shubhangi Raut
>            Priority: Major
>              Labels: security
>
> *Description :*
> *Severity :* CVE CVSS 3: 7.5Sonatype CVSS 3: 5.3
> *Weakness :* CVE CWE: 770
> *Source :* National Vulnerability Database
> *Categories :* Data
> *Description from CVE :* In spring framework versions *prior to 5.3.20* and 
> old unsupported versions, applications that handle file uploads are 
> vulnerable to DoS attack if they rely on data binding to set a MultipartFile 
> or javax.servlet.Part to a field in a model object.
> *Explanation :* The spring-beans package is vulnerable to Allocation of 
> Resources Without Limits or Throttling. The constructor method in the 
> CachedIntrospectionResults class was disallowed from loading all ClassLoaders 
> in an attempt to avoid exposing dangerous classes that could lead to Remote 
> Code Execution vulnerabilities. This change caused the application server to 
> eventually crash in applications handling file uploads where MulipartFile and 
> javax.servlet.Part types are used in data binding. An attacker may craft 
> malicious file upload requests to Spring WebFlux or Spring MVC applications 
> and cause a Denial of Service [DoS] condition to servers that are affected by 
> this issue.
> The Sonatype security research team discovered that the root cause of the 
> vulnerability is in spring-beans, not directly in spring-mvc and 
> spring-webflux as the advisory states, and was introduced via a regression 
> following a fix for CVE-2022-22965 [SpringShell] in versions 5.2.20.RELEASE 
> for the 5.2.x branch, and 5.3.18 in the 5.3.x branch.
> *Detection :* The application is vulnerable by using this component.
> *Recommendation :* We recommend upgrading to a version of this component that 
> is not vulnerable to this specific issue.
> *CVE :* CVE-2022-22970
> *URL :* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22970]
> Please upgrade the spring-version to latest available 5.3.20.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to