Spring Framework detection scan (Windows)
Log In or Register to download the BES file, and more.

0 Votes

Versioning - This is the latest version.

1Spring Framework detection scan (Windows)4/1/2022 1:05:12 PM
2Spring Framework detection scan (Windows)5/11/2022 8:45:31 AM
3Spring Framework detection scan (Windows)5/11/2022 1:09:13 PM

Description

This is Community Content. When you use these solutions, it is incumbent on your organization to test any solutions provided across the broadest available system base including various OS, storage solutions, and application inventory.

Please see the Community Solution Testing Statement

This Task performs a filesystem scan on Windows systems to attempt detecting Spring Framework versions that may be vulnerable to one of the following vulnerabilties reported in March 2022:

 

https://tanzu.vmware.com/security/cve-2022-22965

https://tanzu.vmware.com/security/cve-2022-22963

https://tanzu.vmware.com/security/cve-2022-22950

https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement

 

This Task performs a filesystem search across all fixed disks on Windows platforms, to locate Spring Framework JAR files, either directly on the filesystem or embedded in a .WAR archive file.  In the case any .WAR file is found on the system, the 'unzip.exe' utility is used to perform a listing of files inside the archive to locate Spring-related .JAR files.  Specifically, this Task searches for any versions of spring-beans-*.jar, spring-core-*.jar, spring-webmvc-*.jar, or spring-webflux-*.jar.  Information on the Spring vulnerabilities is still evolving, but each of these has been cited as potential problem vectors.

Scan results are stored in a "Scans" subdirectory beneath the "BES Client" folder. 'Spring-scan-output.txt' contains the full script output for potential debugging or diagnosis, and 'Spring-scan.txt' contains a listing of detected files in one of the forms

C:\temp\spring\spring-framework-5.3.7\libs\spring-webmvc-5.3.7.jar
C:\temp\spring\test\spring-5.2.20.RELEASE-dist.war||spring-framework-5.2.20.RELEASE/libs/spring-beans-5.2.20.RELEASE.jar

The first sample entry indicates a detected Spring .jar file directly in the filesystem, while the second entry indicates a Spring .jar file embedded within a .WAR archive.

This Task has several known limitations:

  • Archives are not extracted recursively - only .JAR files contained directly within a .WAR archive are found; archives embedded within multiple layers of .WAR archives are not detected.
  • There is no option to throttle the scan in terms of processor or disk i/o usage.  Scans should be executed during non-critical hours, and staggered over time especially where multiple systems share a storage resource, such as a SAN or virtual machine storage pool.

This detection method uses Windows batch scripts with no external utility aside from 'unzip.exe'.  Results of the scan may be retrieved using the related Analysis.


Property Details

ID26932
StatusBeta - Preliminary testing ready for more
TitleSpring Framework detection scan (Windows)
DomainBESC
SourceInternal
Source Release Date3/31/2022 12:00:00 AM
KeywordsSpring, vulnerability, scan, cve-2022-22950, cve-2022-22963, cve-2022-22965
Is TaskTrue
Added by on 5/11/2022 1:09:13 PM
Last Modified by on 5/11/2022 1:09:13 PM
Counters 282 Views / 6 Downloads
User Rating 1 star 2 star 3 star 4 star 5 star * Average over 0 ratings. ** Log In or Register to add your rating.

Relevance

Used in 16 fixlets and 16 analyses   * Results in a true/false
Show indented relevance
windows of operating system AND (if exists property "in proxy agent context" then not in proxy agent context else true)

Actions

Action 1 (default)

Action Link Click here to deploy this action.
Script Type BigFix Action Script
begin prefetch block
add prefetch item name=unzip.exe sha1=84debf12767785cd9b43811022407de7413beb6f size=204800 url=http://software.bigfix.com/download/redist/unzip-6.0.exe sha256=2122557d350fd1c59fb0ef32125330bde673e9331eb9371b454c2ad2d82091ac
end prefetch block
// Add Unzip to Utility Cache:
utility __Download\unzip.exe

parameter "unzip"="{pathname of file "__Download\unzip.exe"}"
parameter "ScansFolder" = "{(if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of parent folder of client folder of site "actionsite"))}\Scans"
folder create "{parameter "ScansFolder"}"

parameter "output"="{pathname of folder (parameter "ScansFolder")}\Spring-scan.txt"
parameter "exec_output"="{pathname of folder (parameter "ScansFolder")}\Spring-scan-output.txt"
delete "{parameter "output"}"
delete "{parameter "exec_output"}"

delete __createfile
createfile until EOF_EOF_EOF_EOF
set UNZIP="{parameter "unzip"}"
setlocal EnableDelayedExpansion
GOTO MAIN
:PROCESSFILE
echo Processfile %*
REM If the file itself matches, output it and exit this function
if %~x1==.jar echo %~dpnx1 >> "{parameter "output"}"& exit /B 0
REM the file is a war/jar, expand it to search for embedded files
REM Use DelayedExpansion and !FILENAME! to prevent 'for' loop crashing on symbols like 'Program Files (x86)'
set FILENAME=%~dpnx1
for /F "tokens=*" %%i in ('"%UNZIP% -Z -1C "!FILENAME!" *spring-beans-*.jar *spring-core-*.jar *spring-webmvc*.jar *spring-webflux-*.jar -x *-sources.jar *-javadoc.jar"') do @echo !FILENAME!^|^|%%i >> "{parameter "output"}"
exit /B 0

:MAIN
echo ::START::%DATE%::%TIME%>> "{parameter "output"}"

{concatenation "%0d%0a" of ("for /F %22tokens=*%22 %25%25i in ('dir /s /b " & it & "\ ^| findstr /R /C:%22.*\.war$%22 /C:%22spring\-beans\-.*\.jar$%22 /C:%22spring\-core\-.*\.jar$%22 /C:%22spring\-webmvc\-.*\.jar$%22 /C:%22spring\-webflux\-.*\.jar$%22 ^|findstr /R /V /C:%22\-javadoc\.jar$%22 /C:%22\-sources\.jar$%22') do CALL :PROCESSFILE %22%25%25~dpnxi%22") of pathnames of root folders of drives whose (type of it = "DRIVE_FIXED")}

endlocal
echo ::FINISH::%DATE%::%TIME%>> "{parameter "output"}"

EOF_EOF_EOF_EOF

delete run_scan.cmd
copy __createfile run_scan.cmd
action uses wow64 redirection {not x64 of operating system}
waithidden cmd.exe /c "run_scan.cmd > "{parameter "output"}" >"{parameter "exec_output"}" 2>&1"
Success Criteria

This action will be considered successful when the applicability relevance evaluates to false.


Sharing

Social Media:
Share this page on Yammer

Comments

Log In or Register to leave comments!