Pivotal Spring Framework contains unsafe Java deserialization methods
Critical severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Jun 1, 2023
Description
Published by the National Vulnerability Database
Jan 2, 2020
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Nov 14, 2022
Last updated
Jun 1, 2023
Pivotal Spring Framework before 6.0.0 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required.
Maintainers recommend investigating alternative components or a potential mitigating control. Version 4.2.6 and 3.2.17 contain enhanced documentation advising users to take precautions against unsafe Java deserialization, version 5.3.0 deprecate the impacted classes and version 6.0.0 removed it entirely.
References