CVE-2016-1000027

Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027 Issue Tracking Third Party Advisory
https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626 Issue Tracking Third Party Advisory
https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417 Issue Tracking Third Party Advisory
https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525 Issue Tracking Third Party Advisory
https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000027.json Broken Link Exploit Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2016-1000027 Third Party Advisory
https://security.netapp.com/advisory/ntap-20230420-0009/
https://spring.io/blog/2022/05/11/spring-framework-5-3-20-and-5-2-22-available-now Release Notes Third Party Advisory
https://www.tenable.com/security/research/tra-2016-20 Exploit Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027 Issue Tracking Third Party Advisory
https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626 Issue Tracking Third Party Advisory
https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417 Issue Tracking Third Party Advisory
https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525 Issue Tracking Third Party Advisory
https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000027.json Broken Link Exploit Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2016-1000027 Third Party Advisory
https://security.netapp.com/advisory/ntap-20230420-0009/
https://spring.io/blog/2022/05/11/spring-framework-5-3-20-and-5-2-22-available-now Release Notes Third Party Advisory
https://www.tenable.com/security/research/tra-2016-20 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:42

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027 - Issue Tracking, Third Party Advisory
References () https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626 - Issue Tracking, Third Party Advisory () https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626 - Issue Tracking, Third Party Advisory
References () https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417 - Issue Tracking, Third Party Advisory () https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417 - Issue Tracking, Third Party Advisory
References () https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525 - Issue Tracking, Third Party Advisory () https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525 - Issue Tracking, Third Party Advisory
References () https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000027.json - Broken Link, Exploit, Third Party Advisory () https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000027.json - Broken Link, Exploit, Third Party Advisory
References () https://security-tracker.debian.org/tracker/CVE-2016-1000027 - Third Party Advisory () https://security-tracker.debian.org/tracker/CVE-2016-1000027 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20230420-0009/ - () https://security.netapp.com/advisory/ntap-20230420-0009/ -
References () https://spring.io/blog/2022/05/11/spring-framework-5-3-20-and-5-2-22-available-now - Release Notes, Third Party Advisory () https://spring.io/blog/2022/05/11/spring-framework-5-3-20-and-5-2-22-available-now - Release Notes, Third Party Advisory
References () https://www.tenable.com/security/research/tra-2016-20 - Exploit, Third Party Advisory () https://www.tenable.com/security/research/tra-2016-20 - Exploit, Third Party Advisory

Information

Published : 2020-01-02 23:15

Updated : 2024-11-21 02:42


NVD link : CVE-2016-1000027

Mitre link : CVE-2016-1000027

CVE.ORG link : CVE-2016-1000027


JSON object : View

Products Affected

vmware

  • spring_framework
CWE
CWE-502

Deserialization of Untrusted Data