Bug 1357929 (CVE-2016-1000027)

Summary: CVE-2016-1000027 spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abenaiss, abhgupta, aileenc, alonbl, bazulay, bmcclain, chazlett, dblechte, dmcphers, drieden, eedri, ellin, ggaughan, gklein, gmalinko, janstey, java-sig-commits, jialiu, jochrist, jokerman, jwon, kseifried, lmeyer, lsurette, mgoldboi, michal.skrivanek, mmccomas, msrb, oourfali, rbalakri, rfreire, Rhev-m-bugs, sbonazzo, scorneli, shbose, sherold, srevivo, sshumake, tiwillia, ykaul, ylavi
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-07-19 15:33:41 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Andrej Nemec 2016-07-19 15:33:23 UTC
Current installations of Pivotal's Spring Framework suffer from a potential remote code execution (RCE) issue. Depending on how the library is implemented within a product, it may or may not manifest, and authentication may be required.

External References:

https://www.tenable.com/security/research/tra-2016-20

Comment 5 Jonathan Christison 2021-06-24 14:41:55 UTC
Marking Red Hat JBoss Fuse 6 and Red Hat Fuse 7 as not affected, although versions before the documentation update (https://github.com/spring-projects/spring-framework/commit/5cbe90b2cd91b866a5a9586e460f311860e11cfa) where shipped at the time there is no use direct usage of org.springframework.remoting.httpinvoker.*

This was fixed upstream by detailing HttpInvoker endpoints should not be exposed to untrusted clients, these upstream changes would of been included with Fuse 6.3 R5 (https://access.redhat.com/errata/RHSA-2017:3115) which included a version change to 3.2.18 (3.2.17 containing the documentation fix)