CVE-2011-2894

Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class.

Published date
2011-10-04T10:55Z
Last modification date
2022-07-17T20:15Z
Assigner
secalert@redhat.com
Problem type
CWE-502
NameURLSourceTags
49536http://www.securityfocus.com/bid/49536BIDThird Party Advisory, VDB Entry
http://www.springsource.com/security/cve-2011-2894http://www.springsource.com/security/cve-2011-2894CONFIRMVendor Advisory
75263http://osvdb.org/75263OSVDBBroken Link
RHSA-2011:1334http://www.redhat.com/support/errata/RHSA-2011-1334.htmlREDHATThird Party Advisory
8405http://securityreason.com/securityalert/8405SREASONThird Party Advisory
spring-framework-object-sec-bypass(69687)https://exchange.xforce.ibmcloud.com/vulnerabilities/69687XFThird Party Advisory, VDB Entry
20110909 CVE-2011-2894: Spring Framework and Spring Security serialization-based remoting vulnerabilitieshttp://www.securityfocus.com/archive/1/519593/100/0/threadedBUGTRAQThird Party Advisory, VDB Entry
https://web.archive.org/web/20120307233721/http://www.springsource.com/security/cve-2011-2894https://web.archive.org/web/20120307233721/http://www.springsource.com/security/cve-2011-2894MISC