Technical Details
The vulnerability arises from the use of data binding in Spring MVC or Spring WebFlux with certain configurations. Specifically, when a Spring application is deployed as a traditional WAR package on Apache Tomcat with Java 9+, attackers can manipulate the ClassLoader via crafted HTTP parameters to write arbitrary files, including web shells, into the application’s working directory.