Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:34883
HistoryMar 31, 2022 - 12:56 a.m.

Remote Code Execution (RCE)

2022-03-3100:56:39
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
173

0.975 High

EPSS

Percentile

100.0%

spring-beans is vulnerable to remote code execution. Using Spring Parameter Binding with non-basic parameter types, such as POJOs, allows an unauthenticated attacker to execute arbitrary code on the target system by writing or uploading arbitrary files (e.g .jsp files) to a location that can be loaded by the application server. Initial analysis at time of writing shows that exploitation of the vulnerability is only possible with JRE 9 and above, and Apache Tomcat 9 and above, and that the vulnerability requires the usage of Spring parameter binding with non-basic parameter types such as POJOs.

References