The Spring4Shell vulnerability is a Remote Code Execution vulnerabilty that was recently discovered in the Spring framework. Hawkscan version
2.3.0 and later includes a rule to scan for this vulnerability in Spring applications, but it is not enabled by default.
In order to activate the Spring4Shell rule, update your
stackhawk.yml scan config to include the corresponding policy name in the
||Runs a scan with all the default rules enabled, with Spring4Shell included.|
||Runs a scan with ONLY the Spring4Shell rule enabled. All other rules will not be run by the scanner.|
hawk: scan: policyName: DEFAULT_SPRING4SHELL