vendor:
Spring Framework
by:
Meder Kydyraliev, Google Security Team
9
CVSS
CRITICAL
Arbitrary Code Execution
94
CWE
Product Name: Spring Framework
Affected Version From: 3.0.0
Affected Version To: 2.5.7
Patch Exists: YES
Related CWE: CVE-2010-1622
CPE: a:springsource:spring_framework
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Apache Tomcat
2010
CVE-2010-1622: Spring Framework execution of arbitrary code
The Spring Framework provides a mechanism to use client provided data to update the properties of an object. This mechanism allows an attacker to modify the properties of the class loader used to load the object (via 'class.classloader'). This can lead to arbitrary command execution since, for example, an attacker can modify the URLs used by the class loader to point to locations controlled by the attacker.
Mitigation:
All users may mitigate this issue by upgrading to 3.0.3 Community users of 2.5.x and earlier may also mitigate this issue by upgrading 2.5.6.SEC02 Subscription users of 2.5.x and earlier may also mitigate this issue by upgrading 2.5.6.SEC02 or 2.5.7.SR01