#HUN #cyberattack Ungarische Nachrichtenportale #Telex und #444 von Cyberangriff betroffen. https://t.co/GoLlr1o6Ms pic.twitter.com/4kUIwsLhLq
— Ransomwaremap (@ransomwaremap) April 2, 2022
#HUN #cyberattack Ungarische Nachrichtenportale #Telex und #444 von Cyberangriff betroffen. https://t.co/GoLlr1o6Ms pic.twitter.com/4kUIwsLhLq
— Ransomwaremap (@ransomwaremap) April 2, 2022
Important — Spring Framework maintainers have released an emergency patch to address a newly disclosed RCE #vulnerability (CVE-2022-22965) that could allow unauthenticated attackers to take control of targeted systems.
Details: https://t.co/ufILxxh8l1#infosec #hackernews #tech
— The Hacker News (@TheHackersNews) March 31, 2022
▓▓▓▓▓▓▓▓▓▓▓░░░░ 76,6% mind. eine Impfdosis
▓▓▓▓▓▓▓▓▓▓▓░░░░ 76,0% vollständig Geimpfte
▓▓▓▓▓▓▓▓▓░░░░░░ 58,8% Booster Geimpfte— Impfstatus Fortschritt (@impf_progress) April 2, 2022
The main advice for anyone who uses the Spring framework is to upgrade to secure versions 5.3.18 or 5.2.20.
The Apache Software Foundation has also released patched versions of Apache Tomcat 10.0.20, 9.0.62, and 8.5.78, in which the attack vector is closed on the Tomcat side.
The Spring developers have also released patched versions of the Spring Boot 2.5.12 and 2.6.6 extensions that depend on the patched version of Spring Framework 5.3.18.
If for some reason you cannot update the above software then you should use one of the workarounds published on the official Spring website