CVE-2011-2894

Severity
6.8MEDIUM
EPSS
2.1%
top 15.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4
Latest updateMay 14

Description

Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via t

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages4 packages

NVDvmware/spring_security2.0.02.0.6
Mavenorg.springframework:spring-core3.0.03.0.6
NVDvmware/spring_framework3.0.03.0.5

🔴Vulnerability Details

3
GHSA
Spring Framework and Spring Security vulnerable to Deserialization of Untrusted Data2022-05-14
OSV
Spring Framework and Spring Security vulnerable to Deserialization of Untrusted Data2022-05-14
CVEList
CVE-2011-2894: Spring Framework 32011-10-04

📋Vendor Advisories

1
Red Hat
Security: Chosen commands execution on the server (Framework) or authentication token bypass (Security) by objects de-serialization2011-09-09

💬Community

1
Bugzilla
CVE-2011-2894 Spring Framework, Spring Security: Chosen commands execution on the server (Framework) or authentication token bypass (Security) by objects de-serialization2011-09-12
CVE-2011-2894 (MEDIUM CVSS 6.8) | Spring Framework 3.0.0 through 3.0. | cvebase.io