Time to take action to protect your software supply chain against Spring4shell (also dubbed Springshell), the latest zero-day vulnerability uncovered on March 30th.
The Remote Code Execution (RCE) exploit in Spring4shell affects any application that uses Spring Framework, one of the most popular frameworks in Java. After an update to JDK9 caused a once-patched vulnerability to reemerge, we are just waiting for the vulnerability to be exploited in the wild. The danger and alarm of Spring4shell echos Log4j when it comes to the low skill level required to execute an attack.
Comparable to the Struts vulnerability that caused the Equifax breach of 2017, this is just the beginning as the story still unfolds. Get the opportunity to ask questions and learn more as we cover everything you need to know now about Spring4shell
Join our Field CTO, Ilkka Turunen, as he discusses:
What exactly the Spring4shell Vulnerability is
How to determine if you’re affected
Why the only path forward is a patch and what that patch looks like
How to protect yourself against similar 0-day open source vulnerabilities in the future
Sonatype Headquarters - 8161 Maple Lawn Blvd #250, Fulton, MD 20759
Tysons Office - 8281 Greensboro Drive – Suite 630, McLean, VA 22102
Australia Office - 60 Martin Place Level 1, Sydney, NSW 2000, Australia
London Office -168 Shoreditch High Street, E1 6HU London
Subscribe for all the latest software security news and events
Copyright © 2008-present, Sonatype Inc. All rights reserved. Includes the third-party code listed here. Sonatype and Sonatype Nexus are trademarks of Sonatype, Inc. Apache Maven and Maven are trademarks of the Apache Software Foundation. M2Eclipse is a trademark of the Eclipse Foundation. All other trademarks are the property of their respective owners.
Terms of Service Privacy Policy Modern Slavery Statement Event Terms and Conditions Do Not Sell My Personal Information