Description
In Java Client API, we use spring-jdbc, 5.2.7
It doesn’t meet the prerequisites listed in CVE-2022-22965
These are the prerequisites for the exploit:
JDK 9 or higher
Apache Tomcat as the Servlet container
Packaged as WAR
spring-webmvc or spring-webflux dependency
However, it has dependencies on spring-core and spring-beans, which are marked as vulnerable in maven central.
The newest version of spring-jdbc 5.3.18 in maven repository has the patch. We better upgrade it to 5.3.18 anyway.
https://tanzu.vmware.com/security/cve-2022-22965
https://wiki.marklogic.com/display/ENGINEERING/Spring4Shell+Vulnerability
So we can address your issue, please include the following:
Version of MarkLogic Java Client API
See Readme.txt
Version of MarkLogic Server
See admin gui on port 8001 or run xdmp:version() in Query Console - port 8000)
Java version
Run java -version
OS and version
For MAC, run sw_vers
.
For Windows, run systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
For Linux, run cat /etc/os-release
and uname -r