Spring4Shell
At the end of 2021 the IT world was rattled with a hidden and critical vulnerability in the LOG4J module. A few months later another very popular and highly used module SPRING framework is also affected (CVE-2022-22965).
Spring is affected when a JDK higher than 9, Apache Tomcat and traditional WAR packaging is used. Affected Versions are 5.3.17 and older.
IBM UrbanCode Deploy (now IBM DevOps Deploy) uses JDK 11, runs on Apache Tomcat as traditional WAR package. So a detailed check was made and the results are very promising.
IBM UrbanCode Deploy
If you are on >= 7.2.0.0, then IBM UCD does not package spring library with these versions and hence not vulnerable.
If you are on < 7.2.0.0, then we do use spring library in the product, but the way we use it, it is not exploitable via this CVE. Hence IBM UrbanCode Deploy is not vulnerable for this CVE
Technical explanation
The vulnerable Spring library we shipped before 7.2.0.0 is exclusively used to statically configure the JMS broker at system startup from a config file stored on disk. Once startup is complete, is is never accessed again. This was verified by a search of the ActiveMQ source code for references to Spring classes, of which there were none outside the configuration module. We then confirmed there are no dynamic uses of the Spring library by tracing accesses to it at runtime while exercising the application, which showed no accesses.
#UrbanCodeDeploy