Lucene search

K
osvGoogleOSV:GHSA-F866-M9MV-2XR3
HistoryMay 14, 2022 - 2:54 a.m.

Spring Framework and Spring Security vulnerable to Deserialization of Untrusted Data

2022-05-1402:54:56
Google
osv.dev
18
spring
security
vulnerable
deserialization
untrusted data
remote attackers
bypass
security restrictions
execute untrusted code
proxy
invocationhandler
aop interfaces
defaultlistablebeanfactory
arbitrary commands
java runtime
software

EPSS

0.022

Percentile

89.5%

Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class.

EPSS

0.022

Percentile

89.5%