-
Notifications
You must be signed in to change notification settings - Fork 153
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2022-22965: Spring Framework RCE via Data Binding on JDK 9+ #364
Comments
Hi Thanks for opening this issue, we were aware of it and started working on a fix. While we were testing the temporary mitigation, the Spring project announced that it would release fixed versions soon. Therefore, we waited for an official fix of the Spring project. We just released ShinyProxy 2.6.1. In this release Spring Boot (and thus Spring Core) has been updated to a patched version. Is ShinyProxy affected by this?ShinyProxy indeed uses the Spring framework, however, we use Undertow as web-server instead of Tomcat. In addition, we don't use the
Let's keep this issue open for a few days, while we monitor the developments around this issue. |
Download links on shinyproxi.io don't appear to point to anything at the moment? |
We made the downloads available again. Thanks for the heads-up. |
Hi, I am using shinyproxy-2.5.0. Am I impacted? I am using OpenDJ 1.8 |
Hi @nsyed4 |
I noticed that version 2.6.1 also has the upgrade log4j-api-2.17.2.jar which addresses the log4jshell vulnberability for added peace of mind. previously i had manually patched the log4j myself, but it's nice to see this version already has this upgrade. thanks guys |
I had some SAML issues with the new version 2.6.1,
but resolved it following the workaround here: Probably not related to springframe work upgrades, but more to do with my environment |
Hi shinyproxy community
it might be early days, but thought i would start the conversation about whether shinyproxy is affected by this new vulnerability. Here's a link to a blog post by spring.io:
https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement
Here's my assessment:
shinyproxy 2.6.0 is running spring-boot version 2.3.4 which is affected by the vulnerability, but we are executing as a JAR file not using tomcat. So while the vulnerability is present, the environment in which the app is executed is still considered safe based on the current knowledge (dated april 1, 2022)
Is that a fair statement?
The text was updated successfully, but these errors were encountered: