<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2209 Information about the Spring4Shell security vulnerability (CVE-2022-22965)</title><link>https://community.appian.com/support/w/kb/2626/kb-2209-information-about-the-spring4shell-security-vulnerability-cve-2022-22965</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2209 Information about the Spring4Shell security vulnerability (CVE-2022-22965)</title><link>https://community.appian.com/support/w/kb/2626/kb-2209-information-about-the-spring4shell-security-vulnerability-cve-2022-22965</link><pubDate>Fri, 08 Apr 2022 22:01:15 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:71318e1a-36a8-4a62-8ec8-075a6c670a54</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2626/kb-2209-information-about-the-spring4shell-security-vulnerability-cve-2022-22965#comments</comments><description>Current Revision posted to Appian Knowledge Base by Elly Meng on 4/8/2022 10:01:15 PM&lt;br /&gt;
&lt;p&gt;On 31-Mar-2021 an announcement was made regarding the Spring4Shell security vulnerability (CVE-2022-22965). Following the announcement, Appian actively investigated whether the impacted library is being used on the Appian platform. Appian has taken the following actions in response:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;The Appian platform currently uses affected versions of Spring. It also uses Tomcat 8 and 9, however, Appian does not believe the platform is vulnerable due to usage of strict json annotations for user-supplied data where Tomcat 9 is used.&lt;/li&gt;
&lt;li&gt;Despite our current assessment that we are not vulnerable, Appian has published a hotfix on 08-Apr-2022 to upgrade the platform to use Spring 5.3.18.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Spring Framework is a Java framework that offers infrastructure support to develop web applications.&lt;/li&gt;
&lt;li&gt;The maintainers of Spring Framework have released an emergency patch to address a newly disclosed remote code execution flaw that, if successfully exploited, could allow an unauthenticated attacker to take control of a targeted system.&lt;/li&gt;
&lt;li&gt;Tracked as &lt;a href="https://tanzu.vmware.com/security/cve-2022-22965"&gt;CVE-2022-22965&lt;/a&gt;, this high-severity flaw impacts Spring Framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19 and other older, unsupported versions. Users are recommended to upgrade to versions 5.3.18 or later and 5.2.20 or later.&lt;/li&gt;
&lt;li&gt;During the same timeline, another Spring vulnerability was announced that we wanted to provide clarification on: RCE in Spring Cloud Function -&amp;nbsp; CVE-2022-22963. Appian is not affected by this vulnerability as we do not utilize this.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Supporting Documentation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.contrastsecurity.com/security-influencers/new-spring4shell-vulnerability-confirmed-what-it-is-and-how-to-be-prepared"&gt;https://www.contrastsecurity.com/security-influencers/new-spring4shell-vulnerability-confirmed-what-it-is-and-how-to-be-prepared&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cyberkendra.com/2022/03/spring4shell-details-and-exploit-code.html"&gt;https://www.cyberkendra.com/2022/03/spring4shell-details-and-exploit-code.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://thehackernews.com/2022/03/security-patch-releases-for-critical.html"&gt;https://thehackernews.com/2022/03/security-patch-releases-for-critical.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751"&gt;https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;31-Mar-2022 - CVE-2022-22965 released&lt;/li&gt;
&lt;li&gt;08-Apr-2022 - Hotfix from Appian released&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all supported versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 8, 2022&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>[DRAFT SP-7587] Information about the Spring4Shell security vulnerability (CVE-2022-22965)</title><link>https://community.appian.com/support/w/kb/2626/kb-2209-information-about-the-spring4shell-security-vulnerability-cve-2022-22965/revision/4</link><pubDate>Fri, 08 Apr 2022 19:10:32 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:71318e1a-36a8-4a62-8ec8-075a6c670a54</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2626/kb-2209-information-about-the-spring4shell-security-vulnerability-cve-2022-22965#comments</comments><description>Revision 4 posted to Appian Knowledge Base by Elly Meng on 4/8/2022 7:10:32 PM&lt;br /&gt;
&lt;p&gt;On 31-Mar-2021 an announcement was made regarding the Spring4Shell security vulnerability (CVE-2022-22965). Following the announcement, Appian actively investigated whether the impacted library is being used on the Appian platform. Appian has taken the following actions in response:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;The Appian platform currently uses affected versions of Spring. It also uses Tomcat 8 and 9, however, Appian does not believe the platform is vulnerable due to usage of strict json annotations for user-supplied data where Tomcat 9 is used.&lt;/li&gt;
&lt;li&gt;Despite our current assessment that we are not vulnerable, Appian has published a hotfix on 08-Apr-2022 to upgrade the platform to use Spring 5.3.18.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Spring Framework is a Java framework that offers infrastructure support to develop web applications.&lt;/li&gt;
&lt;li&gt;The maintainers of Spring Framework have released an emergency patch to address a newly disclosed remote code execution flaw that, if successfully exploited, could allow an unauthenticated attacker to take control of a targeted system.&lt;/li&gt;
&lt;li&gt;Tracked as &lt;a href="https://tanzu.vmware.com/security/cve-2022-22965"&gt;CVE-2022-22965&lt;/a&gt;, this high-severity flaw impacts Spring Framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19 and other older, unsupported versions. Users are recommended to upgrade to versions 5.3.18 or later and 5.2.20 or later.&lt;/li&gt;
&lt;li&gt;During the same timeline, another Spring vulnerability was announced that we wanted to provide clarification on: RCE in Spring Cloud Function -&amp;nbsp; CVE-2022-22963. Appian is not affected by this vulnerability as we do not utilize this.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Supporting Documentation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.contrastsecurity.com/security-influencers/new-spring4shell-vulnerability-confirmed-what-it-is-and-how-to-be-prepared"&gt;https://www.contrastsecurity.com/security-influencers/new-spring4shell-vulnerability-confirmed-what-it-is-and-how-to-be-prepared&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cyberkendra.com/2022/03/spring4shell-details-and-exploit-code.html"&gt;https://www.cyberkendra.com/2022/03/spring4shell-details-and-exploit-code.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://thehackernews.com/2022/03/security-patch-releases-for-critical.html"&gt;https://thehackernews.com/2022/03/security-patch-releases-for-critical.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751"&gt;https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;31-Mar-2022 - CVE-2022-22965 released&lt;/li&gt;
&lt;li&gt;08-Apr-2022 - Hotfix from Appian released&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all supported versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 8, 2022&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>[DRAFT SP-7587] Information about the Spring4Shell security vulnerability (CVE-2022-22965)</title><link>https://community.appian.com/support/w/kb/2626/kb-2209-information-about-the-spring4shell-security-vulnerability-cve-2022-22965/revision/3</link><pubDate>Fri, 08 Apr 2022 19:07:58 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:71318e1a-36a8-4a62-8ec8-075a6c670a54</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2626/kb-2209-information-about-the-spring4shell-security-vulnerability-cve-2022-22965#comments</comments><description>Revision 3 posted to Appian Knowledge Base by Elly Meng on 4/8/2022 7:07:58 PM&lt;br /&gt;
&lt;p&gt;On 31-Mar-2021 an announcement was made regarding the Spring4Shell security vulnerability (CVE-2022-22965). Following the announcement, Appian actively investigated whether the impacted library is being used on the Appian platform. Appian has taken the following actions in response:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;The Appian platform currently uses affected versions of Spring. It also uses Tomcat 8 and 9, however, Appian does not believe the platform is vulnerable due to usage of strict json annotations for user-supplied data where Tomcat 9 is used.&lt;/li&gt;
&lt;li&gt;Despite our current assessment that we are not vulnerable, Appian has published a hotfix on 07-Apr-2022 to upgrade the platform to use Spring 5.3.18.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Spring Framework is a Java framework that offers infrastructure support to develop web applications.&lt;/li&gt;
&lt;li&gt;The maintainers of Spring Framework have released an emergency patch to address a newly disclosed remote code execution flaw that, if successfully exploited, could allow an unauthenticated attacker to take control of a targeted system.&lt;/li&gt;
&lt;li&gt;Tracked as &lt;a href="https://tanzu.vmware.com/security/cve-2022-22965"&gt;CVE-2022-22965&lt;/a&gt;, this high-severity flaw impacts Spring Framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19 and other older, unsupported versions. Users are recommended to upgrade to versions 5.3.18 or later and 5.2.20 or later.&lt;/li&gt;
&lt;li&gt;During the same timeline, another Spring vulnerability was announced that we wanted to provide clarification on: RCE in Spring Cloud Function -&amp;nbsp; CVE-2022-22963. Appian is not affected by this vulnerability as we do not utilize this.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Supporting Documentation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.contrastsecurity.com/security-influencers/new-spring4shell-vulnerability-confirmed-what-it-is-and-how-to-be-prepared"&gt;https://www.contrastsecurity.com/security-influencers/new-spring4shell-vulnerability-confirmed-what-it-is-and-how-to-be-prepared&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cyberkendra.com/2022/03/spring4shell-details-and-exploit-code.html"&gt;https://www.cyberkendra.com/2022/03/spring4shell-details-and-exploit-code.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://thehackernews.com/2022/03/security-patch-releases-for-critical.html"&gt;https://thehackernews.com/2022/03/security-patch-releases-for-critical.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751"&gt;https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;31-Mar-2022 - CVE-2022-22965 released&lt;/li&gt;
&lt;li&gt;07-Apr-2022 - Hotfix from Appian released&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all supported versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 8, 2022&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>[DRAFT SP-7587] Information about the Spring4Shell security vulnerability (CVE-2022-22965)</title><link>https://community.appian.com/support/w/kb/2626/kb-2209-information-about-the-spring4shell-security-vulnerability-cve-2022-22965/revision/2</link><pubDate>Thu, 07 Apr 2022 16:55:59 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:71318e1a-36a8-4a62-8ec8-075a6c670a54</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2626/kb-2209-information-about-the-spring4shell-security-vulnerability-cve-2022-22965#comments</comments><description>Revision 2 posted to Appian Knowledge Base by Elly Meng on 4/7/2022 4:55:59 PM&lt;br /&gt;
&lt;p&gt;On 31-Mar-2021 an announcement was made regarding the Spring4Shell security vulnerability (CVE-2022-22965). Following the announcement, Appian actively investigated whether the impacted library is being used on the Appian platform. Appian has taken the following actions in response:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;The Appian platform currently uses affected versions of Spring. It also uses Tomcat 8 and 9, however, Appian does not believe the platform is vulnerable due to usage of strict json annotations for user-supplied data where Tomcat 9 is used.&lt;/li&gt;
&lt;li&gt;Despite our current assessment that we are not vulnerable, Appian has published a hotfix on 07-Apr-2022 to upgrade the platform to use Spring 5.3.18.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Spring Framework is a Java framework that offers infrastructure support to develop web applications.&lt;/li&gt;
&lt;li&gt;The maintainers of Spring Framework have released an emergency patch to address a newly disclosed remote code execution flaw that, if successfully exploited, could allow an unauthenticated attacker to take control of a targeted system.&lt;/li&gt;
&lt;li&gt;Tracked as &lt;a href="https://tanzu.vmware.com/security/cve-2022-22965"&gt;CVE-2022-22965&lt;/a&gt;, this high-severity flaw impacts Spring Framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19 and other older, unsupported versions. Users are recommended to upgrade to versions 5.3.18 or later and 5.2.20 or later.&lt;/li&gt;
&lt;li&gt;During the same timeline, another Spring vulnerability was announced that we wanted to provide clarification on: RCE in Spring Cloud Function -&amp;nbsp; CVE-2022-22963. Appian is not affected by this vulnerability as we do not utilize this.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Supporting Documentation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.contrastsecurity.com/security-influencers/new-spring4shell-vulnerability-confirmed-what-it-is-and-how-to-be-prepared"&gt;https://www.contrastsecurity.com/security-influencers/new-spring4shell-vulnerability-confirmed-what-it-is-and-how-to-be-prepared&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cyberkendra.com/2022/03/spring4shell-details-and-exploit-code.html"&gt;https://www.cyberkendra.com/2022/03/spring4shell-details-and-exploit-code.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://thehackernews.com/2022/03/security-patch-releases-for-critical.html"&gt;https://thehackernews.com/2022/03/security-patch-releases-for-critical.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751"&gt;https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;31-Mar-2022 - CVE-2022-22965 released&lt;/li&gt;
&lt;li&gt;07-Apr-2022 - Hotfix from Appian released&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all supported versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 7, 2022&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>[DRAFT SP-7587] Information about the Spring4Shell security vulnerability (CVE-2022-22965)</title><link>https://community.appian.com/support/w/kb/2626/kb-2209-information-about-the-spring4shell-security-vulnerability-cve-2022-22965/revision/1</link><pubDate>Thu, 07 Apr 2022 16:53:49 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:71318e1a-36a8-4a62-8ec8-075a6c670a54</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2626/kb-2209-information-about-the-spring4shell-security-vulnerability-cve-2022-22965#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Elly Meng on 4/7/2022 4:53:49 PM&lt;br /&gt;
&lt;p&gt;On 31-Mar-2021 an announcement was made regarding the Spring4Shell security vulnerability (CVE-2022-22965). Following the announcement, Appian actively investigated whether the impacted library is being used on the Appian platform. Appian has taken the following actions in response:&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;The Appian platform currently uses affected versions of Spring. It also uses Tomcat 8 and 9, however, Appian does not believe the platform is vulnerable due to usage of strict json annotations for user-supplied data where Tomcat 9 is used.&lt;/li&gt;
&lt;li&gt;Despite our current assessment that we are not vulnerable, Appian has published a hotfix on 07-Apr-2022 to upgrade the platform to use Spring 5.3.18.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Spring Framework is a Java framework that offers infrastructure support to develop web applications.&lt;/li&gt;
&lt;li&gt;The maintainers of Spring Framework have released an emergency patch to address a newly disclosed remote code execution flaw that, if successfully exploited, could allow an unauthenticated attacker to take control of a targeted system.&lt;/li&gt;
&lt;li&gt;Tracked as &lt;a href="https://tanzu.vmware.com/security/cve-2022-22965"&gt;CVE-2022-22965&lt;/a&gt;, this high-severity flaw impacts Spring Framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19 and other older, unsupported versions. Users are recommended to upgrade to versions 5.3.18 or later and 5.2.20 or later.&lt;/li&gt;
&lt;li&gt;During the same timeline, another Spring vulnerability was announced that we wanted to provide clarification on: RCE in Spring Cloud Function -&amp;nbsp; CVE-2022-22963. Appian is not affected by this vulnerability as we do not utilize this.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Supporting Documentation:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.contrastsecurity.com/security-influencers/new-spring4shell-vulnerability-confirmed-what-it-is-and-how-to-be-prepared"&gt;https://www.contrastsecurity.com/security-influencers/new-spring4shell-vulnerability-confirmed-what-it-is-and-how-to-be-prepared&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.cyberkendra.com/2022/03/spring4shell-details-and-exploit-code.html"&gt;https://www.cyberkendra.com/2022/03/spring4shell-details-and-exploit-code.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://thehackernews.com/2022/03/security-patch-releases-for-critical.html"&gt;https://thehackernews.com/2022/03/security-patch-releases-for-critical.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751"&gt;https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;31-Mar-2022 - CVE-2022-22965 released&lt;/li&gt;
&lt;li&gt;07-Apr-2022 - Hotfix from Appian released&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all supported versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 7, 2022&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item></channel></rss>