Warning of dangerous Spring4Shell vulnerability, there are signs of scanning and exploiting
Soon after, a guide to exploiting the Spring4Shell vulnerability in the Spring Framework was posted on GitHub and deleted. But the internet was an open world, so that exploit was quickly re-shared elsewhere and tested and confirmed by security researchers as a standard Spring4Shell-only exploit.
The Spring4Shell vulnerability exists in Spring Core, a core component of the Spring Framework open source code. Currently, Spring Framework is commonly used in web applications. It is estimated that about 50% of web applications written in Java use Spring Core. According to the assessment, Sping4Shell is more dangerous than the Log4Shell vulnerability, one of the most dangerous vulnerabilities of the decade that was discovered at the end of 2021.
According to the Cybersecurity Monitoring Center, there have been groups of hackers that have scanned and tested Spring4Shell on some technology systems of agencies and organizations.
To fix the vulnerability, IT admins need to update to the following versions:
- Spring Framework 5.3.18 and Spring Framework 5.2.20.
- Spring Boot 2.5.12.
- Spring Boot 2.6.6 (to be released soon).
The Spring4Shell vulnerability is particularly dangerous because developers often use sample code for their applications. Therefore, many applications are at risk of being attacked online.
Admins need to prioritize deploying updates as soon as possible. The reason is because hackers are actively exploiting new vulnerabilities.
You should read it
- 12-year vulnerability in pkexec gives hackers root privileges on Linux
- Patches of dangerous vulnerabilities being exploited by hackers contain dangerous holes and then continue to be exploited by hackers
- Microsoft urgently patched zero-day vulnerability after 2 years of refusing to acknowledge it
- Specter V2 vulnerability re-appears to attack Intel, Arm CPUs, AMD chips are not affected
- Detected a serious zero-day vulnerability in Microsoft Office, click the document file and it will stick
- 'Printer Catastrophe' Vulnerability Threatens All Versions of Windows
- Google discovered a dangerous zero day vulnerability on many Samsung Galaxy, Huawei, Xiaomi and even Pixel phones
- What is VENOM Vulnerability? How can you protect yourself?
May be interested
- Microsoft allows users to reactivate Windows App installermicrosoft has just allowed enterprise administrators to re-enable the msix ms-appinstaller protocol handler. windows app installer used to be disabled to avoid being abused by the emotet malware.
- This is the world's fastest ransomware, encrypting 53GB of data in just over 4 minutesransomware tested includes revil , darkside, babuk, maze, lockbit and several other ransomware on both windows 10 and windows server 2019 editions.
- Teen hacker is believed to be behind the notorious hacker group Lapsus$in recent weeks, the lapsus$ hacker group has appeared in the media. security researchers are actively investigating the activities of the lapsus$ hacker group.
- Lapsus$ hacker group claims to be in possession of Microsoft's source codeon the morning of sunday, march 20, 2022, the lapsus$ hacker group announced that they were in possession of some microsoft source code.
- Microsoft will improve the experience of playing audio CDs in Windows 11microsoft recently released build 22579 windows 11 to the insider community in the dev channel. the new build is mainly focused on improving existing features.
- Malware sneaks into iOS through Apple's official distribution channelstaking advantage of distribution channels of unapproved applications for testing purposes, malicious code has quietly sneaked into ios users' devices.