Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-2894

Опубликовано: 04 окт. 2011
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 6.8

Описание

Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class.

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

ignored

end of life
maverick

ignored

end of life
natty

ignored

end of life

Показывать по

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

cosmic

not-affected

devel

not-affected

disco

not-affected

esm-apps/bionic

not-affected

esm-apps/xenial

not-affected

esm-infra-legacy/trusty

not-affected

hardy

DNE

lucid

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
hardy

DNE

lucid

DNE

maverick

ignored

end of life
natty

ignored

end of life

Показывать по

EPSS

Процентиль: 95%
0.19567
Средний

6.8 Medium

CVSS2

Связанные уязвимости

redhat
почти 14 лет назад

Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class.

nvd
больше 13 лет назад

Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class.

debian
больше 13 лет назад

Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3. ...

github
около 3 лет назад

Spring Framework and Spring Security vulnerable to Deserialization of Untrusted Data

EPSS

Процентиль: 95%
0.19567
Средний

6.8 Medium

CVSS2

Уязвимость CVE-2011-2894