Fix available for the Spring4Shell security vulnerability CVE-2022-22965
Issue
A detailed description of the vulnerability (CVSS v3 rating: 9.8) can be found on the Spring Framework RCE, Early Announcement page.
Please follow the BMC Security Advisory Note for further updates.
If you have any questions about the problem, contact BMC Support.
We recommend that you immediately apply the fix as described in this topic.
Resolution
Verify the application version
- Log in to Smart Reporting with administrator permissions.
- Select Administration > System Information, as shown in the following image:
Verify the application version in the System Information screen, as shown in the following image:
Upgrade Spring Shell in an existing Smart Reporting instance (Remediation option)
- Navigate to https://mvnrepository.com/ and download the .jar files specified in step 3 and step 4.
- Stop Smart Reporting services.
- From the downloaded location, copy the following files into <Installation directory>/webapps/ROOT/WEB-INF/lib folder:
- spring-aop-5.3.18.jar
- spring-beans-5.3.18.jar
- spring-context-5.3.18.jar
- spring-context-support-5.3.18.jar
- spring-core-5.3.18.jar
- spring-expression-5.3.18.jar
- spring-web-5.3.18.jar
- spring-webmvc-5.3.18.jar
- spring-websocket-5.3.18.jar
- Copy the following files into <Installation directory>/webapps/AdminConsole/WEB-INF/lib folder:
- spring-aop-5.3.18.jar
- spring-beans-5.3.18.jar
- spring-context-5.3.18.jar
- spring-core-5.3.18.jar
- spring-expression-5.3.18.jar
- spring-jcl-5.3.18.jar
- spring-jdbc-5.3.18.jar
- spring-tx-5.3.18.jar
- spring-web-5.3.18.jar
Remove the existing spring libraries from their respective folders.
5.2.7.R!ELEASE55.2.7.RELEASE5.2.7.RELEASE
Replace the binary files with the above mentioned binaries.
- After replacing the spring binaries, restart the Smart Reporting services.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*