6
CVSSv2

CVE-2010-1622

Published: 21/06/2010 Updated: 13/02/2023
CVSS v2 Base Score: 6 | Impact Score: 6.4 | Exploitability Score: 6.8
VMScore: 609
Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

SpringSource Spring Framework 2.5.x prior to 2.5.6.SEC02, 2.5.7 prior to 2.5.7.SR01, and 3.0.x prior to 3.0.3 allows remote malicious users to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle fusion middleware 11.1.1.8.0

oracle fusion middleware 7.6.2

oracle fusion middleware 11.1.1.6.1

springsource spring framework 2.5.0

springsource spring framework 3.0.1

springsource spring framework 2.5.3

springsource spring framework 3.0.2

springsource spring framework 2.5.5

springsource spring framework 2.5.6

springsource spring framework 2.5.4

springsource spring framework 2.5.2

springsource spring framework 2.5.7

springsource spring framework 3.0.0

springsource spring framework 2.5.1

Vendor Advisories

CVE-2022-22963 Informational: Impact of Spring Vulnerabilities CVE-2022-22963 and CVE-2010-1622 Bypass ...

Exploits

CVE-2010-1622: Spring Framework execution of arbitrary code Severity: Critical Vendor: SpringSource, a division of VMware Versions Affected: 300 to 302 250 to 256SEC01 (community releases) 250 to 257 (subscription customers) Earlier versions may also be affected Description: The Spring Framework provides a mechanism to use client ...

Github Repositories

CVE-2010-1622 用的 jar CVE-2010-1622 攻击条件: springmvc(准确来说是 spring-beans) 和 tomcat 的版本有要求 必须要能运行 jsp 必须要有一个 jsp 当中使用了 taglib 标签,并且这个 jsp 此前都没有被访问过(jsp 只会编译一次) 必须要有一个路由方法,其参数的类型非String、prime type

The project describes how a security analyst in the Security Operations Center responds, mitigates, analyzes a malware attack and handles incident postmortem.

Malware_attack_response The project describes how a security analyst in the Security Operations Center responds, mitigates, analyzes a malware attack and handles incident postmortem Certificate of Completion Practical Skills Developed Cybersecurity | Incident Triage | Detection & Response | Research | Communication | Data Analysis | Teamwork | Network Analysis | Probl

Spring-CVE-2010-1622

Spring-CVE-2010-1622

cve-2010-1622 Learning Environment

cve-2010-1622_learning_environment tomcat 6026 Jdk1845 This Project Include simple SpringMvc source code and a Dockerfile you can use to build the environment

Demonstrable Proof of Concept Exploit for Spring4Shell Vulnerability (CVE-2022-22965)

Spring4Shell - PoC CVE - 2022 - 22965 Versions affected : Spring Framework versions 530 to 5317, 520 to 5219 and older versions Java JDK 9 Apache Tomcat versions below 10020, 9062, and 8578 Applications that are packaged as a traditional WAR with spring-webmvc or spring-webflux dependency and deployed on a standalone Servlet container alone are affected Descrip

CVE-2022-22965 Spring4Shell research & PoC

CVE-2022-22965-spring4shell CVE-2022-22965 Spring4Shell research & PoC for learning purposes Blog post A more detailed analysis and explanation of the vulnerability can be found on my blog post Comments on initial research Based on the initial research I did on githubcom/GuayoyoCyber/CVE-2022-22965 with these additions: modifications on HelloWorld class and h

Spring has Confirmed the RCE in Spring Framework. The team has just published the statement along with the mitigation guides for the issue. Now, this vulnerability can be tracked as CVE-2022-22965.

spring-shell-vuln Spring4Shell: Spring core RCE vulnerability Spring has Confirmed the RCE in Spring Framework The team has just published the statement along with the mitigation guides for the issue Now, this vulnerability can be tracked as CVE-2022-22965 Some information about the Spring4Shell vulnerability and have shared the details on Spring4Shell: Details and Exploit

A write-up for SecDojo Spring4shell lab.

spring4shell-secdojo A write-up for SecDojo Spring4shell lab SecDojo CyberLabs is a cyber security learning platform where you can put in practice your theoretical knowledge throughout training in LAB environments in order to help you assess the required knowledge for a proper acquisition of the concepts What is Spring4Shell vulnerability? A brief explanation of Spring4Shell

Everything I needed to understand what was going on with "Spring4Shell" - translated source materials, exploit, links to demo apps, and more.

springcore-0day-en These are all my notes from the alleged confirmed! 0day dropped on 2022-03-29 This vulnerability is commonly referred to as "Spring4Shell" in the InfoSec community - an unfortunate name that calls back to the log4shell cataclysm, when (so far), impact of that magnitude has not been demonstrated I hope this repository helps you assess the situation

漏洞简介 最近spring爆出重磅级CVE漏洞,cve信息显示"A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding The specific exploit requires the application to run on Tomcat as a WAR deployment If the application is deployed as a Spring Boot executable jar, ie the default, it is not vul

Phân tích CVE 2022-22965_Spring4Shell Mô tả lỗ hổng Spring4Shell là tên của một CVE tồn tại trên Spring Core của Spring Framework Với điểm CVSS 3x là 98, lỗ hổng được xếp vào mức rủi ro cao nhất( critical) Lỗ hổng này cho phép kẻ tấn công thực hiện chạy

Vulnerabilidad RCE en Spring Framework vía Data Binding on JDK 9+ (CVE-2022-22965 aka "Spring4Shell")

CVE-2022-22965 aka "Spring4Shell" Vulnerabilidad RCE en Spring Framework vía Data Binding on JDK 9+ El objetivo es centralizar la mayor cantidad de información de público conocimiento hasta el momento de la vulnerabilidad y poder saber qué acciones tomar en tal caso ¿Mi aplicación es vulnerable? Las condiciones (AND) que se

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nat…

CVE-2022-22965_Spring4Shell CVE-2022-22965 (Spring4Shell, SpringShell) is a vulnerability in the Spring Framework that uses data binding functionality to bind data stored within an HTTP request to certain objects used by an application The bug exists in the getCachedIntrospectionResults method, which can be used to gain unauthorized access to such objects by passing their clas

Recent Articles

Spring4Shell (CVE-2022-22965): details and mitigations
Securelist • AMR • 04 Apr 2022

Last week researchers found the critical vulnerability CVE-2022-22965 in Spring – the open source Java framework. Using the vulnerability, an attacker can execute arbitrary code on a remote web server, which makes CVE-2022-22965 a critical threat, given the Spring framework’s popularity. By analogy with the infamous Log4Shell threat, the vulnerability was named Spring4Shell. CVE-2022-22965 and CVE-2022-22963: technical details CVE-2022-22965 (Spring4Shell, SpringShell) is a vulnerability in ...