CVE-2016-1000027: Deserialization of Untrusted Data
(updated )
Pivotal Spring Framework through 6.0.0 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor’s position is that untrusted data is not an intended use case. The product’s behavior will not be changed because some users rely on deserialization of trusted data.
References
- bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027
- github.com/advisories/GHSA-4wrc-f8pq-fpqp
- github.com/spring-projects/spring-framework/commit/5cbe90b2cd91b866a5a9586e460f311860e11cfa
- github.com/spring-projects/spring-framework/issues/24434
- github.com/spring-projects/spring-framework/issues/24434
- nvd.nist.gov/vuln/detail/CVE-2016-1000027
- security-tracker.debian.org/tracker/CVE-2016-1000027
- support.contrastsecurity.com/hc/en-us/articles/4402400830612-Spring-web-Java-Deserialization-CVE-2016-1000027
- www.tenable.com/security/research/tra-2016-20
Detect and mitigate CVE-2016-1000027 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →