Created on 04-13-2022 07:09 AM Edited on 04-14-2022 07:35 AM By Anonymous
Description |
This article describes how the CVE-2022-22965 and CVE-2022-22963 vulnerabilities affect FortiSOAR as it uses the Spring Framework with JDK 11. The CVE-2022-22965 vulnerability states that A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. FortiSOAR is affected by this vulnerability since it uses the Spring Boot framework which is dependent on the Spring framework. |
Scope | FortiSOAR releases 7.0.x. |
Solution |
Upgraded the Spring Boot Framework to 2.5.12. Install the fsr-cve-2022-22965-fix.zip security patch to fix this vulnerability on FortiSOAR 7.0.x as follows:
1). SSH into the FortiSOAR VM and log in as a root user.
2). Download the security patch file from the repo server using the following command:
3). Extract the fsr-cve-2022-22965-fix.zip using command and go to the extracted directory:
4). Run the shell script 'hotfix.sh' to apply the changes:
|
Note: To fix these vulnerabilities in earlier releases of FortiSOAR, it is recommended to upgrade the firmware to 7.x.x series. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.