Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
References
| Link | Resource |
|---|---|
| https://security-tracker.debian.org/tracker/CVE-2016-1000027 | Third Party Advisory |
| https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000027.json | Broken Link Exploit Third Party Advisory |
| https://www.tenable.com/security/research/tra-2016-20 | Exploit Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027 | Issue Tracking Third Party Advisory |
| https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417 | Issue Tracking Third Party Advisory |
| https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626 | Issue Tracking Third Party Advisory |
| https://spring.io/blog/2022/05/11/spring-framework-5-3-20-and-5-2-22-available-now | Release Notes Third Party Advisory |
| https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525 | Issue Tracking Third Party Advisory |
Configurations
Information
Published : 2020-01-02 15:15
Updated : 2022-12-07 11:59
NVD link : CVE-2016-1000027
Mitre link : CVE-2016-1000027
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
vmware
- spring_framework


