Schneider, APC support forum to share knowledge about installation and configuration for Data Center and Business Power UPSs, Accessories, Software, Services.
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send InviteCancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Looks like the latest version of PowerChute Network Shutdown (latest version - 5.0.0) has a vulnerability in the VMware Spring Runtime (spring-core-5.3.22.jar). I've confirmed the file does exist in the {Installation Drive}:\Program Files\APC\PowerChute\group1\lib\ directory and is vulnerable to the CVE below.
When the update is issued, will the latest version from the Spring Framework (6.1.0) be used? There are several other CVE's that exist in the 5.x versions.
Here's the output of Greenbone Security Assistant (GSA) scan on my Windows Server 2022 VM running APC PowerChute Network Shutdown 5.0:
Summary
The VMware Spring Framework is prone to a security bypass vulnerability.
Using '**' as a pattern in Spring Security configuration with the 'mvcRequestMatcher' creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.
Detection Method
Checks if a vulnerable version is present on the target host.