CVE-2011-2894
Severity CVSS v4.0:
Pending analysis
Type:
CWE-502
Deserialization of Untrusted Dat
Publication date:
04/10/2011
Last modified:
11/04/2025
Description
Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:* | 3.0.0 (including) | 3.0.5 (including) |
cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* | 2.0.0 (including) | 2.0.6 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://osvdb.org/75263
- http://securityreason.com/securityalert/8405
- http://www.redhat.com/support/errata/RHSA-2011-1334.html
- http://www.securityfocus.com/archive/1/519593/100/0/threaded
- http://www.securityfocus.com/bid/49536
- http://www.springsource.com/security/cve-2011-2894
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69687
- https://web.archive.org/web/20120307233721/http://www.springsource.com/security/cve-2011-2894
- http://osvdb.org/75263
- http://securityreason.com/securityalert/8405
- http://www.redhat.com/support/errata/RHSA-2011-1334.html
- http://www.securityfocus.com/archive/1/519593/100/0/threaded
- http://www.securityfocus.com/bid/49536
- http://www.springsource.com/security/cve-2011-2894
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69687
- https://web.archive.org/web/20120307233721/http://www.springsource.com/security/cve-2011-2894