org.apache.commons:commons-collections4@4.0 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.commons:commons-collections4 package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Deserialization of Untrusted Data

org.apache.commons:commons-collections4 is an Apache Commons Collections package contains types that extend and augment the Java Collections Framework.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It is possible to execute arbitrary Java code with the InvokerTransformer serializable collections . The sun.reflect.annotation.AnnotationInvocationHandler#readObject method invokes #entrySet and #get on a deserialized collection. If an attacker has to ability to send serialized data (JMX, RMI, EJB) to an application using the common-collections library, it is possible to combine the aforementioned methods to execute arbitrary code on the application.

NOTE: This vulnerability has also been identified as: CVE-2015-4852

How to fix Deserialization of Untrusted Data?

Upgrade org.apache.commons:commons-collections4 to version 4.1 or higher.

[4.0,4.1)
  • C
Deserialization of Untrusted Data

org.apache.commons:commons-collections4 is an Apache Commons Collections package contains types that extend and augment the Java Collections Framework.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It is possible to execute arbitrary Java code with the InvokerTransformer serializable collections . The sun.reflect.annotation.AnnotationInvocationHandler#readObject method invokes #entrySet and #get on a deserialized collection. If an attacker has to ability to send serialized data (JMX, RMI, EJB) to an application using the common-collections library, it is possible to combine the aforementioned methods to execute arbitrary code on the application.

NOTE: This vulnerability has also been identified as: CVE-2015-7501

How to fix Deserialization of Untrusted Data?

Upgrade org.apache.commons:commons-collections4 to version 4.1 or higher.

[4.0,4.1)