commons-collections:commons-collections@3.1 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the commons-collections:commons-collections package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Deserialization of Untrusted Data

commons-collections:commons-collections is a library which contains types that extend and augment the Java Collections Framework.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. Versions of commons-collections prior to 3.2.2 do not prevent deserialization of the class org.apache.commons.collections.functors.InvokerTransformer. This could be leveraged by an attacker as a gadget within a vulnerable application which deserializes user input to execute arbitrary code.

Versions of commons-collections from 3.2.2 onwards will throw an UnsupportedOperationException error when attempts are made to deserialize InvokerTransformer instances to prevent potential remote code execution exploits.

Note: org.apache.commons:commons-collections is no longer supported and has been moved to org.apache.commons:commons-collections4 we recommend moving to the new artifact if possible.

How to fix Deserialization of Untrusted Data?

Upgrade commons-collections:commons-collections to version 3.2.2 or higher.

[,3.2.2)
  • C
Deserialization of Untrusted Data

commons-collections:commons-collections is a library which contains types that extend and augment the Java Collections Framework.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It is possible to execute arbitrary Java code with the InvokerTransformer serializable collections . The sun.reflect.annotation.AnnotationInvocationHandler#readObject method invokes #entrySet and #get on a deserialized collection. If an attacker has to ability to send serialized data (JMX, RMI, EJB) to an application using the common-collections library, it is possible to combine the aforementioned methods to execute arbitrary code on the application.

org.apache.commons:commons-collections is no longer supported and has been moved to org.apache.commons:commons-collections4. We recommend moving to the new artifact if possible.

NOTE:

This vulnerability has also been identified as: CVE-2015-4852

How to fix Deserialization of Untrusted Data?

Upgrade commons-collections:commons-collections to version 3.2.2 or higher.

[3.0,3.2.2)
  • C
Deserialization of Untrusted Data

commons-collections:commons-collections is a library which contains types that extend and augment the Java Collections Framework.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It is possible to execute arbitrary Java code with the InvokerTransformer serializable collections . The sun.reflect.annotation.AnnotationInvocationHandler#readObject method invokes #entrySet and #get on a deserialized collection. If an attacker has to ability to send serialized data (JMX, RMI, EJB) to an application using the common-collections library, it is possible to combine the aforementioned methods to execute arbitrary code on the application.

org.apache.commons:commons-collections is no longer supported and has been moved to org.apache.commons:commons-collections4. We recommend moving to the new artifact if possible.

NOTE:

This vulnerability has also been identified as: CVE-2015-7501

How to fix Deserialization of Untrusted Data?

Upgrade commons-collections:commons-collections to version 3.2.2 or higher.

[3.0,3.2.2)