Skip to content

spring4shell-logo-(1)

what IS SPRING4SHELL

A 0-day Remote Code Execution (RCE) vulnerability was discovered Tuesday, March 29,2022 impacting applications using certain versions of the Spring Framework and Java running on Apache Tomcat. A change introduced in Java 9 roughly five years ago combined with the Spring Framework can lead to vulnerable applications. Click the button below for a detailed explanation.

WHAT IS SPRING FRAMEWORK

The Spring Framework is the foundation for most enterprise applications written in the Java programming language. Our recent data showed Spring Core as being used by 74% of Java applications. Specifically, Spring provides the "plumbing" of enterprise applications so that teams can focus on application-level business logic, without unnecessary ties to specific deployment environments

why does it matter to me?

Here are a few requirements for an application to be vulnerable, it must:

  • Use Spring Framework 5.3.0 to 5.3.17 5.2.0 to 5.2.19 Older, unsupported versions are also affected
  • Use Java (JDK) 9+Run on Apache Tomcat packaged as a WAR file (Spring Boot, jar packaging not impacted)
  • Have a spring-webmvc or spring-webflux dependency
  • You use form binding with name=value pairs – not using Spring’s more popular message conversion of JSON/XML
  • You don’t use an allowlist -OR- you don’t have a denylist that blocks fields like “class”, “module”, “classLoader”

 

 

Preventing the Spring4Shell Exploit: a Demonstration

The video illustrates the Spring4Shell attack and how Contrast finds and stops the attack.

Contrast Protect

Can protect your Java applications against exploits like Spring4Shell.

Learn More
protect-2

CISO Guidance on Spring4Shell

Get a CISO security perspective on this latest vulnerability to learn the latest details and how to protect yourself now and going forward.

Additional Resources

cs-spring4shell-blog-demo-img-1200x627-033022

Spring4Shell Vulnerability: What it is and how to prepare

BLOG

On March 29, 2022, a Chinese cybersecurity research firm leaked an attack that could impact most enterprise Java applications, globally. An investigation of the issue showed that the root cause was a vulnerability in the widely used, free, community-developed, open-source programming framework called Spring Core.

log4shell-video

Preventing the Initial Spring4Shell Exploit

DEMO VIDEO

While planning to implement the suggested updates to both Spring and Tomcat, deploying Contrast Protect delivers immediate protection against Spring4Shell. Ethan Shimooka, Systems Engineer for Contrast Security, created this timely video highlighting the issue and easy implementation of Contrast Protect to shield against attacks.

cs-spring4shell-blog-2-img-1200x627-033022

CISO Guidance on Spring4Shell

ON-DEMAND WEBINAR

Get a CISO security perspective on this latest vulnerability to learn the latest details and how to protect yourself now and going forward.

Experience Contrast today

Leverage the Contrast secure code platform and service offerings to stop attacks at runtime with Contrast Protect.