Hello,
We have local installs of the Reference CCDA Validator with the Referenceccdaservice.war file for CDA validation purposes .
Our company's security team reached out to us stating "Rapid7 Insight" scan flagged a security vulnerability as follows on Referenceccdaservice.war
"Spring Framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.12.19, and older versions when running on JDK 9 or above and specifically packaged as a traditional WAR and deployed in a standalone Tomcat instance are vulnerable to remote code execution due to an unsafe data binding used to populate an object from request parameter to set a Tomcat specific ClassLoader. By crafting a request to the application and referencing the org apache.catalina.values.AccessLogValue class through the classLoader with parameters such as the following: class.module.classLoader.resources.context.parent.pipeline.suffix.first = .jsp, an unethical attacker can gain remote code execution"
Initially, we hoped that we can can simply take the
latest war file y'all have 3.1.71 from sept 25. But
upon checking it's pom file, it appears it is still using spring and older framework which is flagged as vulnerable.
...
<dependencyManagement>
<dependencies>
<dependency>
<groupId>org.springframework</groupId>
<artifactId>spring-framework-bom</artifactId>
<version>4.3.30.RELEASE</version>
<type>pom</type>
Do you have plan to release a newer war which addresses this vulnerability? OR is one already available from y'all (in case we aren't looking in the right place)?
Thank you.
Sundar