CVE-2022-22965: Spring4Shell
What is Spring4Shell?
Remote code execution via data binding in Spring MVC and Spring WebFlux when running on JDK 9+. Attackers can modify the ClassLoader through crafted HTTP parameters to achieve arbitrary file writes and shell execution.
Impact & Exploitation
Affected the most popular Java web framework. Exploits were available within 24 hours of disclosure. Government agencies issued emergency directives for patching.
How Precogs AI Detects Spring4Shell
Precogs AI detects vulnerable Spring Framework versions in compiled Java applications, Docker images, and Kubernetes deployments — even when Spring is transitively included through other dependencies.