Spring Framework and Spring Security vulnerable to Deserialization of Untrusted Data
Moderate severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Mar 14, 2024
Description
Published by the National Vulnerability Database
Oct 4, 2011
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Jul 13, 2022
Last updated
Mar 14, 2024
Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class.
References