Investigate vulnerability: Deserialization of Untrusted Data
Issue created from vulnerability 245
Description:
Pivotal Spring Framework through 6.0.0 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
- Severity: critical
- Location: pom.xml
Solution:
Upgrade to version 6.0.0 or above.
Identifiers:
- GHSA-4wrc-f8pq-fpqp
- Gemnasium-5bc80a77-eee9-4e8a-aadf-3fa48eba7a88
- CVE-2016-1000027
- CWE-78
- CWE-502
- CWE-1035
- CWE-937
Links:
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027
- https://github.com/advisories/GHSA-4wrc-f8pq-fpqp
- https://github.com/spring-projects/spring-framework/commit/5cbe90b2cd91b866a5a9586e460f311860e11cfa
- https://github.com/spring-projects/spring-framework/issues/24434
- https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-1231625331
- https://nvd.nist.gov/vuln/detail/CVE-2016-1000027
- https://security-tracker.debian.org/tracker/CVE-2016-1000027
- https://support.contrastsecurity.com/hc/en-us/articles/4402400830612-Spring-web-Java-Deserialization-CVE-2016-1000027
- https://www.tenable.com/security/research/tra-2016-20
Scanner:
- Name: GitLab SBoM Vulnerability Scanner