{"id":10592,"date":"2022-04-04T17:49:32","date_gmt":"2022-04-04T14:49:32","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10592"},"modified":"2022-04-04T18:03:33","modified_gmt":"2022-04-04T15:03:33","slug":"spring4shell-critical-vulnerability-in-spring-java-framework","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/spring4shell-critical-vulnerability-in-spring-java-framework\/10592\/","title":{"rendered":"Spring4Shell: Spring Java \u00e7er\u00e7evesindeki kritik g\u00fcvenlik a\u00e7\u0131\u011f\u0131"},"content":{"rendered":"<p>Ara\u015ft\u0131rmac\u0131lar, Java platformu i\u00e7in a\u00e7\u0131k kaynakl\u0131 bir framework olan Spring\u2019de, <a href=\"https:\/\/tanzu.vmware.com\/security\/cve-2022-22965\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2022-22965<\/a> kodlu, kritik bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 ke\u015ffettiler. Ne yaz\u0131k ki, daha g\u00fcvenlik a\u00e7\u0131\u011f\u0131yla ilgili resmi duyuru ve yamalar yay\u0131nlanmadan g\u00fcvenlik a\u00e7\u0131\u011f\u0131na ili\u015fkin ayr\u0131nt\u0131lar kamuoyuna s\u0131zd\u0131r\u0131ld\u0131.<\/p>\n<p>G\u00fcvenlik a\u00e7\u0131\u011f\u0131, bir\u00e7ok web uygulamas\u0131 i\u00e7in ciddi bir potansiyel tehdit olu\u015fturmas\u0131 nedeniyle bilgi g\u00fcvenli\u011fi uzmanlar\u0131n\u0131n hemen dikkatini \u00e7ekti. Yeni g\u00fcvenlik a\u00e7\u0131\u011f\u0131, \u00e7okca konu\u015fulan <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/log4shell-critical-vulnerability-in-apache-log4j\/10361\/\" target=\"_blank\" rel=\"noopener\">Log4Shell<\/a>\u2018e benzer \u015fekilde, Spring4Shell olarak adland\u0131r\u0131ld\u0131.<\/p>\n<p>VMware Spring \u00e7er\u00e7evesinin yarat\u0131c\u0131lar\u0131, g\u00fcvenlik a\u00e7\u0131\u011f\u0131 bulunan uygulamalar\u0131 d\u00fczeltmek i\u00e7in yamalar yay\u0131nlad\u0131, bu nedenle Spring Framework s\u00fcr\u00fcm 5.3 ve 5.2 kullanan t\u00fcm \u015firketlerin derhal 5.3.18 veya 5.2.20 s\u00fcr\u00fcmlerine y\u00fckseltmelerini \u00f6neriyoruz.<\/p>\n<h2>Spring4Shell nedir ve bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131 neden bu kadar tehlikeli?<\/h2>\n<p>Spring4Shell, RCE s\u0131n\u0131f\u0131na ait yani bir sald\u0131rgan\u0131n uzaktan k\u00f6t\u00fc ama\u00e7l\u0131 kod y\u00fcr\u00fctmesine izin veren bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131d\u0131r. \u015eu an g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n \u00f6nem seviyesi <a href=\"https:\/\/www.first.org\/cvss\/calculator\/3.0#CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H\" target=\"_blank\" rel=\"noopener nofollow\">CVSS v3.0 hesaplay\u0131c\u0131s\u0131na g\u00f6re<\/a> 10 \u00fczerinden 9,8. G\u00fcvenlik a\u00e7\u0131\u011f\u0131, Java Development Kit 9 veya \u00fczeri s\u00fcr\u00fcmler alt\u0131nda \u00e7al\u0131\u015fan Spring MVC ve Spring WebFlux uygulamalar\u0131n\u0131 etkiliyor.<\/p>\n<p>Ara\u015ft\u0131rmac\u0131lar, ke\u015ffedilen g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 Sal\u0131 gecesi VMware\u2019e bildirmi\u015flerdi ki \u00c7ar\u015famba g\u00fcn\u00fc g\u00fcvenlik a\u00e7\u0131\u011f\u0131yla ilgili kavram kan\u0131t\u0131 (PoC) GitHub\u2019da yay\u0131nland\u0131. PoC h\u0131zla kald\u0131r\u0131lsa da g\u00fcvenlik uzmanlar\u0131 (baz\u0131lar\u0131 g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n tehlikesini do\u011frulad\u0131) taraf\u0131ndan fark edildi. Ve bu kadar g\u00fc\u00e7l\u00fc bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n siber su\u00e7lular taraf\u0131ndan fark edilmemesi de pek olas\u0131 de\u011fil.<\/p>\n<p>Spring Framework\u2019\u00fc, Java geli\u015ftiricileri aras\u0131nda olduk\u00e7a pop\u00fclerdir, bu da potansiyel olarak bir\u00e7ok uygulaman\u0131n savunmas\u0131z olabilece\u011fi anlam\u0131na geliyor. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-spring-java-framework-zero-day-allows-remote-code-execution\/\" target=\"_blank\" rel=\"noopener nofollow\">Bleeping Computer taraf\u0131ndan payla\u015f\u0131lan bir g\u00f6nderiye<\/a> g\u00f6re, Spring4Shell\u2019e kar\u015f\u0131 savunmas\u0131z olan Java uygulamalar\u0131, \u00e7ok say\u0131da sunucunun g\u00fcvenli\u011finin ihlal edilmesine neden olabilir. Ayr\u0131ca ayn\u0131 g\u00f6nderiye g\u00f6re, g\u00fcvenlik a\u00e7\u0131\u011f\u0131 hali haz\u0131rda sald\u0131rganlar taraf\u0131ndan aktif olarak kullan\u0131l\u0131yor.<\/p>\n<h2>Spring4Shell g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n istismar edilmesi i\u00e7in gereken ko\u015fullar<\/h2>\n<p>Yay\u0131nland\u0131\u011f\u0131 tarihte bilinen tek Spring4Shell istismar y\u00f6ntemi i\u00e7in belirli ko\u015fullar\u0131n bir araya gelmesi gerekiyor. G\u00fcvenlik a\u00e7\u0131\u011f\u0131 istismar\u0131n\u0131n ba\u015far\u0131l\u0131 olmas\u0131 i\u00e7in sald\u0131r\u0131ya u\u011frayan tarafta a\u015fa\u011f\u0131daki bile\u015fenlerin kullan\u0131lmas\u0131 gerekiyor:<\/p>\n<ul>\n<li>Java Geli\u015ftirme Kiti s\u00fcr\u00fcm 9 veya \u00fczeri,<\/li>\n<li>Bir sunucu uygulamas\u0131 kapsay\u0131c\u0131s\u0131 olarak Apache Tomcat,<\/li>\n<li>Varsay\u0131lan JAR yerine WAR (Web Uygulama Kayna\u011f\u0131) dosya format\u0131,<\/li>\n<li>Spring-webmvc veya spring-webflux ba\u011f\u0131ml\u0131l\u0131klar\u0131,<\/li>\n<li>Spring \u00e7er\u00e7evesinin 5.3.0\u2019dan 5.3.17\u2019ye, 5.2.0\u2019dan 5.2.19\u2019a kadar veya daha eski s\u00fcr\u00fcmleri.<\/li>\n<\/ul>\n<p>Bununla birlikte, hen\u00fcz bilinmeyen istismar se\u00e7eneklerinin olmas\u0131 ve ayn\u0131 g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan ba\u015fka bir \u015fekilde yararlan\u0131lmas\u0131 da olduk\u00e7a olas\u0131.<\/p>\n<h2>Kendinizi Spring4Shell\u2019e kar\u015f\u0131 nas\u0131l korursunuz?<\/h2>\n<p>Spring \u00e7er\u00e7evesini kullanan herkes i\u00e7in ana tavsiye, kullan\u0131lan s\u00fcr\u00fcm\u00fcn, g\u00fcvenli olan 5.3.18 veya 5.2.20 s\u00fcr\u00fcmlerine y\u00fckseltilmesidir.<\/p>\n<p>Ayn\u0131 zamanda Apache Software Foundation, Tomcat taraf\u0131nda sald\u0131r\u0131 vekt\u00f6r\u00fcn\u00fcn kapat\u0131ld\u0131\u011f\u0131 Apache Tomcat 10.0.20, 9.0.62 ve 8.5.78\u2019in yamal\u0131 s\u00fcr\u00fcmlerini yay\u0131nlad\u0131.<\/p>\n<p>Spring geli\u015ftiricileri de, Spring Framework 5.3.18\u2019in yamal\u0131 s\u00fcr\u00fcm\u00fcne ba\u011fl\u0131 olan Spring Boot <a href=\"https:\/\/spring.io\/blog\/2022\/03\/31\/spring-boot-2-5-12-available-now\" target=\"_blank\" rel=\"noopener nofollow\">2.5.12<\/a> ve <a href=\"https:\/\/spring.io\/blog\/2022\/03\/31\/spring-boot-2-6-6-available-now\" target=\"_blank\" rel=\"noopener nofollow\">2.6.6<\/a> uzant\u0131lar\u0131n\u0131n yamal\u0131 s\u00fcr\u00fcmlerini yay\u0131nlad\u0131.<\/p>\n<p>Herhangi bir nedenle yukar\u0131daki yaz\u0131l\u0131m\u0131 g\u00fcncelleyemiyorsan\u0131z, resmi Spring internet sitesinde yay\u0131nlanan <a href=\"https:\/\/spring.io\/blog\/2022\/03\/31\/spring-framework-rce-early-announcement\" target=\"_blank\" rel=\"noopener nofollow\">ge\u00e7ici \u00e7\u00f6z\u00fcmlerden<\/a> birini kullanmal\u0131s\u0131n\u0131z.<\/p>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-b2b\"><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ara\u015ft\u0131rmac\u0131lar, pop\u00fcler bir Java Framework&#8217;\u00fc olan Spring&#8217;de kritik bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 buldu. G\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131, neden tehlikeli oldu\u011funu ve bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan nas\u0131l korunaca\u011f\u0131n\u0131z\u0131 a\u00e7\u0131kl\u0131yoruz.<\/p>\n","protected":false},"author":2698,"featured_media":10595,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727,1351],"tags":[2517,2543,790,2542],"class_list":{"0":"post-10592","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"category-threats","11":"tag-0days","12":"tag-cve-2022-22965","13":"tag-guvenlik-aciklari","14":"tag-spring4shell"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/spring4shell-critical-vulnerability-in-spring-java-framework\/10592\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/spring4shell-critical-vulnerability-in-spring-java-framework\/24004\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/spring4shell-critical-vulnerability-in-spring-java-framework\/19491\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/spring4shell-critical-vulnerability-in-spring-java-framework\/9841\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/spring4shell-critical-vulnerability-in-spring-java-framework\/26315\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/spring4shell-critical-vulnerability-in-spring-java-framework\/24273\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/spring4shell-critical-vulnerability-in-spring-java-framework\/27032\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/spring4shell-critical-vulnerability-in-spring-java-framework\/26579\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/spring4shell-critical-vulnerability-in-spring-java-framework\/33028\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/spring4shell-critical-vulnerability-in-spring-java-framework\/44034\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/spring4shell-critical-vulnerability-in-spring-java-framework\/18704\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/spring4shell-critical-vulnerability-in-spring-java-framework\/19275\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/spring4shell-critical-vulnerability-in-spring-java-framework\/15895\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/spring4shell-critical-vulnerability-in-spring-java-framework\/28407\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/spring4shell-critical-vulnerability-in-spring-java-framework\/28188\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/spring4shell-critical-vulnerability-in-spring-java-framework\/24916\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/spring4shell-critical-vulnerability-in-spring-java-framework\/30353\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/spring4shell-critical-vulnerability-in-spring-java-framework\/30121\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/guvenlik-aciklari\/","name":"g\u00fcvenlik a\u00e7\u0131klar\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2698"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10592"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10592\/revisions"}],"predecessor-version":[{"id":10597,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10592\/revisions\/10597"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10595"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}