Deserialization of Untrusted Data Affecting libspring-java package, versions <4.2.7-1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-LIBSPRINGJAVA-384982
- published 27 Jun 2018
- disclosed 2 Jan 2020
Introduced: 27 Jun 2018
CVE-2016-1000027 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
libspring-java
to version 4.2.7-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libspring-java
package and not the libspring-java
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
References
- https://security-tracker.debian.org/tracker/CVE-2016-1000027
- https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000027.json
- https://www.tenable.com/security/research/tra-2016-20
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027
- https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626
- https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417
- https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525
- https://security.netapp.com/advisory/ntap-20230420-0009/
- https://spring.io/blog/2022/05/11/spring-framework-5-3-20-and-5-2-22-available-now