<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Spring4Shell vulnerability in Alfresco Forum</title>
    <link>https://connect.hyland.com/t5/alfresco-forum/spring4shell-vulnerability/m-p/144155#M38264</link>
    <description>&lt;P&gt;The Spring Frameworks vulnerabilities&amp;nbsp;CVE-2022-22963 and&amp;nbsp;CVE-2022-22965 requires special preconditions&lt;BR /&gt;(see &lt;A href="https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement" target="_blank" rel="noopener nofollow noreferrer"&gt;https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement&lt;/A&gt;)&lt;BR /&gt;to be exploited. To my current knowledge, a class loading mechanism in Tomcat Common Logging allows the exploitation of this "Spring4Shell" vulnerability in the first place.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Until Alfresco has evaluated&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;CVE-2022-22963 (Spring Cloud Function)&lt;/DIV&gt;&lt;DIV&gt;CVE-2022-22965 (Spring MVC and Spring WebFlux)&lt;BR /&gt;&lt;BR /&gt;in its inernal jira MNTs and provide a HF for all its Spring Framework related products, we could react by:&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;UPGRADING TOMCAT!&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;P&gt;New Tomcat versions are now available for download:&lt;BR /&gt;&lt;BR /&gt;Tomcat 9 (for ACS 7.0-ACS7.2):&lt;BR /&gt;&lt;A href="https://dlcdn.apache.org/tomcat/tomcat-9/v9.0.62/bin/apache-tomcat-9.0.62.tar.gz" target="_blank" rel="noopener nofollow noreferrer"&gt;https://dlcdn.apache.org/tomcat/tomcat-9/v9.0.62/bin/apache-tomcat-9.0.62.tar.gz&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Tomcat 8 (for ACS 6.0-ACS6.2):&lt;BR /&gt;&lt;A href="https://dlcdn.apache.org/tomcat/tomcat-8/v8.5.78/bin/apache-tomcat-8.5.78.tar.gz" target="_blank" rel="noopener nofollow noreferrer"&gt;https://dlcdn.apache.org/tomcat/tomcat-8/v8.5.78/bin/apache-tomcat-8.5.78.tar.gz&lt;/A&gt;&lt;/P&gt;&lt;P&gt;With Apache Tomcat versions 10.0.20, 9.0.62 and 8.5.78, the WebappClassLoaderBase.getResources() method has been disabled. This prevents attacks via Spring4Shell vulnerability and as far as I know secures Alfresco Content Services against this exploit.&lt;/P&gt;More information:&lt;BR /&gt;&lt;A href="https://tomcat.apache.org/tomcat-10.0-doc/changelog.html#Tomcat_10.0.20_(market" target="_blank" rel="noopener nofollow noreferrer"&gt;https://tomcat.apache.org/tomcat-10.0-doc/changelog.html#Tomcat_10.0.20_(market&lt;/A&gt;)&lt;BR /&gt;&lt;A href="https://tomcat.apache.org/tomcat-9.0-doc/changelog.html#Tomcat_9.0.62_(remm" target="_blank" rel="noopener nofollow noreferrer"&gt;https://tomcat.apache.org/tomcat-9.0-doc/changelog.html#Tomcat_9.0.62_(remm&lt;/A&gt;)&lt;BR /&gt;&lt;A href="https://tomcat.apache.org/tomcat-8.5-doc/changelog.html#Tomcat_8.5.78_(market" target="_blank" rel="noopener nofollow noreferrer"&gt;https://tomcat.apache.org/tomcat-8.5-doc/changelog.html#Tomcat_8.5.78_(market&lt;/A&gt;)&lt;BR /&gt;&lt;BR /&gt;Additionally the National Cyber Security Centrum has published&amp;nbsp;&amp;nbsp;a compilation on Spring4Shell,&lt;BR /&gt;&lt;A href="https://github.com/NCSC-NL/spring4shell" target="_blank" rel="noopener nofollow noreferrer"&gt;https://github.com/NCSC-NL/spring4shell&lt;/A&gt;&lt;BR /&gt;with&amp;nbsp;a list of known vulnerable and non-vulnerable software, as well as detection tools and vulnerability scanners.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Please check your own extensions / applications (*.war) running in the same Tomcat as Alfresco Content Service for the "Spring4Shell" vulnerability!&lt;/SPAN&gt;&lt;/DIV&gt;</description>
    <pubDate>Mon, 04 Apr 2022 14:59:31 GMT</pubDate>
    <dc:creator>aitseitz</dc:creator>
    <dc:date>2022-04-04T14:59:31Z</dc:date>
    <item>
      <title>Spring4Shell vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/spring4shell-vulnerability/m-p/144152#M38261</link>
      <description>&lt;P&gt;Is this something we should worry about?&lt;/P&gt;&lt;P&gt;&lt;A title="Spring4Shell" href="https://venturebeat.com/2022/03/30/spring4shell-vulnerability-likely-to-affect-real-world-apps-analyst-says/" target="_self" rel="nofollow noopener noreferrer"&gt;https://venturebeat.com/2022/03/30/spring4shell-vulnerability-likely-to-affect-real-world-apps-analyst-says/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://tanzu.vmware.com/security/cve-2022-22965" target="_self" rel="nofollow noopener noreferrer"&gt;CVE-2022-22965&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 13:13:19 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/spring4shell-vulnerability/m-p/144152#M38261</guid>
      <dc:creator>GerhardSA</dc:creator>
      <dc:date>2022-04-01T13:13:19Z</dc:date>
    </item>
    <item>
      <title>Re: Spring4Shell vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/spring4shell-vulnerability/m-p/144153#M38262</link>
      <description>&lt;P&gt;We're still evaluating the impact of this vulnerability in the ACS Stack.&lt;/P&gt;
&lt;P&gt;It's highly unlikely that vanilla Alfresco deployment is vulnerable to this CVE, but we'll be publishing an official statement related to this topic in the next days.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 13:22:45 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/spring4shell-vulnerability/m-p/144153#M38262</guid>
      <dc:creator>angelborroy</dc:creator>
      <dc:date>2022-04-01T13:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: Spring4Shell vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/spring4shell-vulnerability/m-p/144154#M38263</link>
      <description>&lt;P&gt;Thank you for the quick reply. We'll be waiting for the official statement.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 13:36:36 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/spring4shell-vulnerability/m-p/144154#M38263</guid>
      <dc:creator>GerhardSA</dc:creator>
      <dc:date>2022-04-01T13:36:36Z</dc:date>
    </item>
    <item>
      <title>Re: Spring4Shell vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/spring4shell-vulnerability/m-p/144155#M38264</link>
      <description>&lt;P&gt;The Spring Frameworks vulnerabilities&amp;nbsp;CVE-2022-22963 and&amp;nbsp;CVE-2022-22965 requires special preconditions&lt;BR /&gt;(see &lt;A href="https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement" target="_blank" rel="noopener nofollow noreferrer"&gt;https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement&lt;/A&gt;)&lt;BR /&gt;to be exploited. To my current knowledge, a class loading mechanism in Tomcat Common Logging allows the exploitation of this "Spring4Shell" vulnerability in the first place.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Until Alfresco has evaluated&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;CVE-2022-22963 (Spring Cloud Function)&lt;/DIV&gt;&lt;DIV&gt;CVE-2022-22965 (Spring MVC and Spring WebFlux)&lt;BR /&gt;&lt;BR /&gt;in its inernal jira MNTs and provide a HF for all its Spring Framework related products, we could react by:&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;UPGRADING TOMCAT!&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;P&gt;New Tomcat versions are now available for download:&lt;BR /&gt;&lt;BR /&gt;Tomcat 9 (for ACS 7.0-ACS7.2):&lt;BR /&gt;&lt;A href="https://dlcdn.apache.org/tomcat/tomcat-9/v9.0.62/bin/apache-tomcat-9.0.62.tar.gz" target="_blank" rel="noopener nofollow noreferrer"&gt;https://dlcdn.apache.org/tomcat/tomcat-9/v9.0.62/bin/apache-tomcat-9.0.62.tar.gz&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Tomcat 8 (for ACS 6.0-ACS6.2):&lt;BR /&gt;&lt;A href="https://dlcdn.apache.org/tomcat/tomcat-8/v8.5.78/bin/apache-tomcat-8.5.78.tar.gz" target="_blank" rel="noopener nofollow noreferrer"&gt;https://dlcdn.apache.org/tomcat/tomcat-8/v8.5.78/bin/apache-tomcat-8.5.78.tar.gz&lt;/A&gt;&lt;/P&gt;&lt;P&gt;With Apache Tomcat versions 10.0.20, 9.0.62 and 8.5.78, the WebappClassLoaderBase.getResources() method has been disabled. This prevents attacks via Spring4Shell vulnerability and as far as I know secures Alfresco Content Services against this exploit.&lt;/P&gt;More information:&lt;BR /&gt;&lt;A href="https://tomcat.apache.org/tomcat-10.0-doc/changelog.html#Tomcat_10.0.20_(market" target="_blank" rel="noopener nofollow noreferrer"&gt;https://tomcat.apache.org/tomcat-10.0-doc/changelog.html#Tomcat_10.0.20_(market&lt;/A&gt;)&lt;BR /&gt;&lt;A href="https://tomcat.apache.org/tomcat-9.0-doc/changelog.html#Tomcat_9.0.62_(remm" target="_blank" rel="noopener nofollow noreferrer"&gt;https://tomcat.apache.org/tomcat-9.0-doc/changelog.html#Tomcat_9.0.62_(remm&lt;/A&gt;)&lt;BR /&gt;&lt;A href="https://tomcat.apache.org/tomcat-8.5-doc/changelog.html#Tomcat_8.5.78_(market" target="_blank" rel="noopener nofollow noreferrer"&gt;https://tomcat.apache.org/tomcat-8.5-doc/changelog.html#Tomcat_8.5.78_(market&lt;/A&gt;)&lt;BR /&gt;&lt;BR /&gt;Additionally the National Cyber Security Centrum has published&amp;nbsp;&amp;nbsp;a compilation on Spring4Shell,&lt;BR /&gt;&lt;A href="https://github.com/NCSC-NL/spring4shell" target="_blank" rel="noopener nofollow noreferrer"&gt;https://github.com/NCSC-NL/spring4shell&lt;/A&gt;&lt;BR /&gt;with&amp;nbsp;a list of known vulnerable and non-vulnerable software, as well as detection tools and vulnerability scanners.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Please check your own extensions / applications (*.war) running in the same Tomcat as Alfresco Content Service for the "Spring4Shell" vulnerability!&lt;/SPAN&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 04 Apr 2022 14:59:31 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/spring4shell-vulnerability/m-p/144155#M38264</guid>
      <dc:creator>aitseitz</dc:creator>
      <dc:date>2022-04-04T14:59:31Z</dc:date>
    </item>
  </channel>
</rss>

