Skip to content

Spring Framework and Spring Security vulnerable to Deserialization of Untrusted Data

Moderate severity GitHub Reviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Mar 14, 2024

Package

maven org.springframework.security:spring-security-core (Maven)

Affected versions

>= 3.0.0, < 3.0.6
>= 2.0.0, < 2.0.7

Patched versions

3.0.6
2.0.7
maven org.springframework:spring-core (Maven)
>= 3.0.0, < 3.0.6
3.0.6

Description

Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class.

References

Published by the National Vulnerability Database Oct 4, 2011
Published to the GitHub Advisory Database May 14, 2022
Reviewed Jul 13, 2022
Last updated Mar 14, 2024

Severity

Moderate

EPSS score

1.508%
(87th percentile)

Weaknesses

CVE ID

CVE-2011-2894

GHSA ID

GHSA-f866-m9mv-2xr3

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.