commons-collections:commons-collections@3.0-dev2 vulnerabilities

  • latest version

    3.2.2

  • latest non vulnerable version

  • first published

    19 years ago

  • latest version published

    9 years ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the commons-collections:commons-collections package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Deserialization of Untrusted Data

    commons-collections:commons-collections is a library which contains types that extend and augment the Java Collections Framework.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. Versions of commons-collections prior to 3.2.2 do not prevent deserialization of the class org.apache.commons.collections.functors.InvokerTransformer. This could be leveraged by an attacker as a gadget within a vulnerable application which deserializes user input to execute arbitrary code.

    Versions of commons-collections from 3.2.2 onwards will throw an UnsupportedOperationException error when attempts are made to deserialize InvokerTransformer instances to prevent potential remote code execution exploits.

    Note: org.apache.commons:commons-collections is no longer supported and has been moved to org.apache.commons:commons-collections4 we recommend moving to the new artifact if possible.

    How to fix Deserialization of Untrusted Data?

    Upgrade commons-collections:commons-collections to version 3.2.2 or higher.

    [,3.2.2)
    • C
    Deserialization of Untrusted Data

    commons-collections:commons-collections is a library which contains types that extend and augment the Java Collections Framework.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It is possible to execute arbitrary Java code with the InvokerTransformer serializable collections . The sun.reflect.annotation.AnnotationInvocationHandler#readObject method invokes #entrySet and #get on a deserialized collection. If an attacker has to ability to send serialized data (JMX, RMI, EJB) to an application using the common-collections library, it is possible to combine the aforementioned methods to execute arbitrary code on the application.

    org.apache.commons:commons-collections is no longer supported and has been moved to org.apache.commons:commons-collections4. We recommend moving to the new artifact if possible.

    Note: the scope of CVE-2015-7501 is limited to the Red Hat JBoss products.

    NOTE:

    This vulnerability has also been identified as: CVE-2015-4852

    How to fix Deserialization of Untrusted Data?

    Upgrade commons-collections:commons-collections to version 3.2.2 or higher.

    [3.0,3.2.2)
    • C
    Deserialization of Untrusted Data

    commons-collections:commons-collections is a library which contains types that extend and augment the Java Collections Framework.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It is possible to execute arbitrary Java code with the InvokerTransformer serializable collections . The sun.reflect.annotation.AnnotationInvocationHandler#readObject method invokes #entrySet and #get on a deserialized collection. If an attacker has to ability to send serialized data (JMX, RMI, EJB) to an application using the common-collections library, it is possible to combine the aforementioned methods to execute arbitrary code on the application.

    org.apache.commons:commons-collections is no longer supported and has been moved to org.apache.commons:commons-collections4. We recommend moving to the new artifact if possible.

    Note: the scope of CVE-2015-4852 is limited to the WebLogic Server product.

    NOTE:

    This vulnerability has also been identified as: CVE-2015-7501

    How to fix Deserialization of Untrusted Data?

    Upgrade commons-collections:commons-collections to version 3.2.2 or higher.

    [3.0,3.2.2)