<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>CVE-2022-22965 and CVE-2022-22963 vulnerabilities</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-22-072</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2022-04-01T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2022-04-01T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2022-04-01T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            Two distinct spring project vulnerabilities where released recently with critical CVSS score and classified as zero-Day attacks.The two vulnerabilities are currently known as :CVE-2022-22965 or Spring4Shell:A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.https://tanzu.vmware.com/security/cve-2022-22965https://www.cyberkendra.com/2022/03/springshell-rce-0-day-vulnerability.html?fbclid=IwAR2fXxKQjG9vnJiOaXyZ1N_Ypx91TOzO6f48qGZRfKRzinYtD5nUCIptIjg&amp;m=1 CVE-2022-22963: In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in access to local resources. https://tanzu.vmware.com/security/cve-2022-22963
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Execute unauthorized code or commands
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            FortiSOAR on-premise 7.2 all versions are not affectedFortiSOAR on-premise 7.0 all versionsFortiSOAR on-premise 6.4 all versions
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="4">
            Upgrade FortiSOAR to version 7.2.0 or aboveORPlease apply the patch provided at [1] for the FortiSOAR product.[1] https://community.fortinet.com/t5/FortiSOAR/Technical-Tip-FortiSOAR-CVE-2022-22965-and-CVE-2022-22963/ta-p/209240
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <ProductTree>
        <Branch Name="Fortinet" Type="Vendor">
            <Branch Name="FortiSOAR on-premise" Type="Product Name">
                <Branch Name="7.0.3" Type="Product Version">
                    <FullProductName ProductID="FortiSOAR on-premise-7.0.3">FortiSOAR on-premise 7.0.3</FullProductName>
                </Branch>
                <Branch Name="7.0.2" Type="Product Version">
                    <FullProductName ProductID="FortiSOAR on-premise-7.0.2">FortiSOAR on-premise 7.0.2</FullProductName>
                </Branch>
                <Branch Name="7.0.1" Type="Product Version">
                    <FullProductName ProductID="FortiSOAR on-premise-7.0.1">FortiSOAR on-premise 7.0.1</FullProductName>
                </Branch>
                <Branch Name="7.0.0" Type="Product Version">
                    <FullProductName ProductID="FortiSOAR on-premise-7.0.0">FortiSOAR on-premise 7.0.0</FullProductName>
                </Branch>
                <Branch Name="6.4.4" Type="Product Version">
                    <FullProductName ProductID="FortiSOAR on-premise-6.4.4">FortiSOAR on-premise 6.4.4</FullProductName>
                </Branch>
                <Branch Name="6.4.3" Type="Product Version">
                    <FullProductName ProductID="FortiSOAR on-premise-6.4.3">FortiSOAR on-premise 6.4.3</FullProductName>
                </Branch>
                <Branch Name="6.4.1" Type="Product Version">
                    <FullProductName ProductID="FortiSOAR on-premise-6.4.1">FortiSOAR on-premise 6.4.1</FullProductName>
                </Branch>
                <Branch Name="6.4.0" Type="Product Version">
                    <FullProductName ProductID="FortiSOAR on-premise-6.4.0">FortiSOAR on-premise 6.4.0</FullProductName>
                </Branch>
            </Branch>
        </Branch>
    </ProductTree>
    <Vulnerability Ordinal="1">
        <Title>CVE-2022-22965 and CVE-2022-22963 vulnerabilities</Title>
        <cvrf:CVE>CVE-2022-22963</cvrf:CVE>
        <cvrf:CVE>CVE-2022-22965</cvrf:CVE>
        <ProductStatuses>
            <Status Type="Known Affected">
                <ProductID>FortiSOAR on-premise-7.0.3</ProductID>
                <ProductID>FortiSOAR on-premise-7.0.2</ProductID>
                <ProductID>FortiSOAR on-premise-7.0.1</ProductID>
                <ProductID>FortiSOAR on-premise-7.0.0</ProductID>
                <ProductID>FortiSOAR on-premise-6.4.4</ProductID>
                <ProductID>FortiSOAR on-premise-6.4.3</ProductID>
                <ProductID>FortiSOAR on-premise-6.4.1</ProductID>
                <ProductID>FortiSOAR on-premise-6.4.0</ProductID>
            </Status>
        </ProductStatuses>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>9.8</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:X/RC:X</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-22-072</URL>
                <Description>CVE-2022-22965 and CVE-2022-22963 vulnerabilities</Description>
            </Reference>Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>