We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
In Java Client API, we use spring-jdbc, 5.2.7
It doesn’t meet the prerequisites listed in CVE-2022-22965
These are the prerequisites for the exploit:
JDK 9 or higher Apache Tomcat as the Servlet container Packaged as WAR spring-webmvc or spring-webflux dependency
However, it has dependencies on spring-core and spring-beans, which are marked as vulnerable in maven central.
The newest version of spring-jdbc 5.3.18 in maven repository has the patch. We better upgrade it to 5.3.18 anyway.
https://help.marklogic.com/Knowledgebase/Article/View/spring4shell-cve-2022-22965-spring-framework-rce-via-data-binding-on-jdk-9
https://tanzu.vmware.com/security/cve-2022-22965
https://wiki.marklogic.com/display/ENGINEERING/Spring4Shell+Vulnerability
So we can address your issue, please include the following:
See Readme.txt
See admin gui on port 8001 or run xdmp:version() in Query Console - port 8000)
Run java -version
java -version
For MAC, run sw_vers. For Windows, run systeminfo | findstr /B /C:"OS Name" /C:"OS Version" For Linux, run cat /etc/os-release and uname -r
sw_vers
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
cat /etc/os-release
uname -r
The text was updated successfully, but these errors were encountered:
upgrade spring-jdbc to 5.3.18 due to Spring4Shell security vulnerabil…
a91b908
…ity marklogic#1340
16c3c2a
…ity #1340
Ran all unit tests and they ran fine.
Sorry, something went wrong.
georgeajit
No branches or pull requests
In Java Client API, we use spring-jdbc, 5.2.7
It doesn’t meet the prerequisites listed in CVE-2022-22965
These are the prerequisites for the exploit:
JDK 9 or higher
Apache Tomcat as the Servlet container
Packaged as WAR
spring-webmvc or spring-webflux dependency
However, it has dependencies on spring-core and spring-beans, which are marked as vulnerable in maven central.
The newest version of spring-jdbc 5.3.18 in maven repository has the patch. We better upgrade it to 5.3.18 anyway.
https://help.marklogic.com/Knowledgebase/Article/View/spring4shell-cve-2022-22965-spring-framework-rce-via-data-binding-on-jdk-9
https://tanzu.vmware.com/security/cve-2022-22965
https://wiki.marklogic.com/display/ENGINEERING/Spring4Shell+Vulnerability
So we can address your issue, please include the following:
Version of MarkLogic Java Client API
See Readme.txt
Version of MarkLogic Server
See admin gui on port 8001 or run xdmp:version() in Query Console - port 8000)
Java version
Run
java -version
OS and version
For MAC, run
sw_vers
.For Windows, run
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
For Linux, run
cat /etc/os-release
anduname -r
Input: Some code to illustrate the problem, preferably in a state that can be independently reproduced on our end
Actual output: What did you observe? What errors did you see? Can you attach the logs? (Java logs, MarkLogic logs)
Expected output: What specifically did you expect to happen?
Alternatives: What else have you tried, actual/expected?
The text was updated successfully, but these errors were encountered: