Yellowfin and the SpringShell Vulnerability

Security researchers have discovered a vulnerability with Spring, which may affect some Yellowfin deployments.

SpringShell (Spring4Shell) CVE 2022-22965 is a critical vulnerability that could potentially lead to remote code execution on an affected Yellowfin server. 
You can read more information on the vulnerability here:

Another similar Spring vulnerability, CVE-2022-22963, does not affect Yellowfin. This affects SpringCloud dependencies which are not used within Yellowfin software.
You can read more information on this vulnerability here:

SpringShell affected Yellowfin versions:

  • Yellowfin Version 9.0 - 9.7.1
  • Yellowfin Version 8.0.4 - 8.0.11

Note: These versions are only vulnerable when running Yellowfin with Java 9 or greater.

Remediation option 1: Use a patched YF

Yellowfin has released patched versions of 8.0.11 (published as and 9.7.1 (published as are not vulnerable to the issue. You can get these releases from the builds page here.

Remediation option 2: Upgrade Yellowfin's Spring Dependencies

  • Download from
  • Stop Yellowfin Server
  • Remove the vulnerable Spring dependencies from the Yellowfin/WEB-INF/lib folder (libraries that match spring-*.jar)
  • Unzip the downloaded file, copy the new Spring dependencies into the Yellowfin/WEB-INF/lib folder
  • Restart Yellowfin Server.

Remediation option 3: Upgrade Apache Tomcat 

Remediation option 4: Use Java 8

Note: Using Java 8 may prevent plugins or JDBC drivers that are compiled against Java 9 or greater from working.

  • Stop Yellowfin Server
  • Install the latest release of Java 8 on your operating system
  • Update the JAVA_HOME variable:
    • For (linux/macOS/unix) deployments. JAVA_HOME is set under Yellowfin/appserver/bin/
    • For Windows deployments please see the following article.
  • Restart Yellowfin Server.

For any questions, or concerns on the above, please reach out to the YF support team via a private ticket


The Yellowfin Support Team

Is this article helpful?
0 0 0