Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2016-1000027: CVE-2016-1000027

Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor’s position is that untrusted data is not an intended use case. The product’s behavior will not be changed because some users rely on deserialization of trusted data.

CVE
#vulnerability#web#ubuntu#debian#red_hat#git#java

Name

CVE-2016-1000027

Description

Pivotal Spring Framework 4.1.4 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required.

Source

CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)

NVD severity

high

Vulnerable and fixed packages

The table below lists information on source packages.

Source Package

Release

Version

Status

libspring-java (PTS)

stretch

4.3.5-1

fixed

stretch (security)

4.3.5-1+deb9u1

fixed

buster

4.3.22-4

fixed

bookworm, sid, bullseye

4.3.30-1

fixed

The information below is based on the following data on fixed versions.

Package

Type

Release

Fixed Version

Urgency

Origin

Debian Bugs

libspring-java

source

(unstable)

4.2.7-1

unimportant

Notes

https://www.tenable.com/security/research/tra-2016-20
This is not a vulnerability in Spring itself, just how applications are using it

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907