<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Alfresco Content Services &amp; Alfresco Process Services : Information on &amp;quot;Spring4Shell&amp;quot; Spring Framework RCE vulnerability? in Alfresco Forum</title>
    <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-content-services-alfresco-process-services-information/m-p/419480#M39342</link>
    <description>&lt;P&gt;Hi, Mickael.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We're still evaluating detailed impact of this vulnerability.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Attacked libraries and versions are used in some of our products, however this is not the only condition to met.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We sill provide an official communication later this week, but it looks like the impact will be very low or none at all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
    <pubDate>Mon, 04 Apr 2022 14:34:21 GMT</pubDate>
    <dc:creator>angel-borroy</dc:creator>
    <dc:date>2022-04-04T14:34:21Z</dc:date>
    <item>
      <title>Alfresco Content Services &amp; Alfresco Process Services : Information on "Spring4Shell" Spring Framework RCE vulnerability?</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-content-services-alfresco-process-services-information/m-p/419479#M39341</link>
      <description>&lt;P&gt;Is Hyland able to provide any information on whether ACS, APS or any related product are impacted by the "Spring4Shell" Spring Framework RCE vulnerability?&lt;BR /&gt;&lt;BR /&gt;Announcement from Spring : &lt;A href="https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement" target="_self"&gt;https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks in advance for your feedback&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards !&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2022 14:27:00 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-content-services-alfresco-process-services-information/m-p/419479#M39341</guid>
      <dc:creator>mne</dc:creator>
      <dc:date>2022-04-04T14:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco Content Services &amp; Alfresco Process Services : Information on "Spring4Shell" Spring Framework RCE vulnerability?</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-content-services-alfresco-process-services-information/m-p/419480#M39342</link>
      <description>&lt;P&gt;Hi, Mickael.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We're still evaluating detailed impact of this vulnerability.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Attacked libraries and versions are used in some of our products, however this is not the only condition to met.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We sill provide an official communication later this week, but it looks like the impact will be very low or none at all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2022 14:34:21 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-content-services-alfresco-process-services-information/m-p/419480#M39342</guid>
      <dc:creator>angel-borroy</dc:creator>
      <dc:date>2022-04-04T14:34:21Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco Content Services &amp; Alfresco Process Services : Information on "Spring4Shell" Spring Framework RCE vulnerability?</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-content-services-alfresco-process-services-information/m-p/419481#M39343</link>
      <description>&lt;P&gt;Hi Angel,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have any recommendations/updates concerning this issue ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Marie Magnier.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2022 08:35:29 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-content-services-alfresco-process-services-information/m-p/419481#M39343</guid>
      <dc:creator>AlfSup</dc:creator>
      <dc:date>2022-09-28T08:35:29Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco Content Services &amp; Alfresco Process Services : Information on "Spring4Shell"</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-content-services-alfresco-process-services-information/m-p/419482#M39344</link>
      <description>&lt;P&gt;@Atol Support Team:&lt;BR /&gt;&lt;BR /&gt;The official Information can be found here:&lt;/P&gt;
&lt;P&gt;&lt;A id="LPlnk288395" href="https://community.hyland.com/connect/hyland-research-and-development/security-advisories/spring-framework-remote-code-execution/products--systems/not-impacted" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-safelink="true" data-linkindex="0" data-ogsc=""&gt;&lt;/A&gt;&lt;BR /&gt;&lt;STRONG&gt;Alfresco Process Services (APS) is impacted from&amp;nbsp; "Spring4Shell"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;--&amp;gt; Upgrade to at least APS version 2.3.1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Alfresco Content Services (ACS) is NOT impacted from "Spring4Shell" in its default configuration.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;--&amp;gt; I fixed the security issue at the customer by upgrading the Tomcat version and can recommend to do so as well.&lt;BR aria-hidden="true" /&gt;See:&amp;nbsp;&lt;A id="LPlnk690883" href="https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-safelink="true" data-linkindex="1" data-ogsc=""&gt;https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement&lt;/A&gt;&lt;/P&gt;
&lt;DIV data-ogsc="black" data-ogsb="white"&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
With Apache Tomcat versions 10.0.20, 9.0.62 and 8.5.78, the WebappClassLoaderBase.getResources() method has been disabled. This prevents attacks via the Spring4Shell vulnerability and secures Alfresco Content Services against this exploit.&lt;/DIV&gt;
&lt;DIV data-ogsc="black" data-ogsb="white"&gt;
&lt;P aria-hidden="true" data-ogsc="rgb(26, 26, 26)" data-ogsb="white"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-ogsc="rgb(26, 26, 26)" data-ogsb="white"&gt;More information:&lt;BR aria-hidden="true" /&gt;&lt;A href="https://tomcat.apache.org/tomcat-10.0-doc/changelog.html#Tomcat_10.0.20_(market)&amp;nbsp;" target="test_blank"&gt;https://tomcat.apache.org/tomcat-10.0-doc/changelog.html#Tomcat_10.0.20_(market)&amp;nbsp;&lt;/A&gt;;&lt;BR aria-hidden="true" /&gt;&lt;A href="https://tomcat.apache.org/tomcat-9.0-doc/changelog.html#Tomcat_9.0.62_(remm)&amp;nbsp;" target="test_blank"&gt;https://tomcat.apache.org/tomcat-9.0-doc/changelog.html#Tomcat_9.0.62_(remm)&amp;nbsp;&lt;/A&gt;;&lt;BR aria-hidden="true" /&gt;&lt;A href="https://tomcat.apache.org/tomcat-8.5-doc/changelog.html#Tomcat_8.5.78_(market)" target="test_blank"&gt;https://tomcat.apache.org/tomcat-8.5-doc/changelog.html#Tomcat_8.5.78_(market)&lt;/A&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV data-ogsc="black" data-ogsb="white"&gt;To check your installed tomcat version:&lt;/DIV&gt;
&lt;DIV data-ogsc="black" data-ogsb="white"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-ogsc="black" data-ogsb="white"&gt;&lt;CODE&gt;/content-services/tomcat/bin$ ./version.sh &amp;nbsp;| grep version&lt;/CODE&gt;&lt;/DIV&gt;
&lt;DIV data-ogsc="black" data-ogsb="white"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-ogsc="black" data-ogsb="white"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-ogsc="black" data-ogsb="white"&gt;&lt;STRONG&gt;Additional hint&amp;nbsp;&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV data-ogsc="black" data-ogsb="white"&gt;In case you've modified Tomcat to use Log4j2 instead of Apache Commons Logging, for a unifom logging format, I can highly recommend to upgrade the log4j2 library &amp;gt; 17.2 to prevent "&lt;STRONG&gt;Log4Shell&lt;/STRONG&gt;" security exploit as well!&lt;/DIV&gt;
&lt;DIV data-ogsc="black" data-ogsb="white"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-ogsc="black" data-ogsb="white"&gt;Additional information to "Log4Shell" from Alfresco&lt;/DIV&gt;
&lt;DIV data-ogsc="black" data-ogsb="white"&gt;&lt;A href="https://hub.alfresco.com/t5/alfresco-content-services-blog/cve-2021-44228-related-to-apache-log4j-security-advisory/ba-p/310717" target="_self"&gt;https://hub.alfresco.com/t5/alfresco-content-services-blog/cve-2021-44228-related-to-apache-log4j-security-advisory/ba-p/310717&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV data-ogsc="black" data-ogsb="white"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-ogsc="black" data-ogsb="white"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-ogsc="black" data-ogsb="white"&gt;best regards&lt;/DIV&gt;
&lt;DIV data-ogsc="black" data-ogsb="white"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-ogsc="black" data-ogsb="white"&gt;Alex&lt;/DIV&gt;</description>
      <pubDate>Fri, 11 Apr 2025 21:56:44 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-content-services-alfresco-process-services-information/m-p/419482#M39344</guid>
      <dc:creator>aitseitz</dc:creator>
      <dc:date>2025-04-11T21:56:44Z</dc:date>
    </item>
  </channel>
</rss>

