Bug 1357929 (CVE-2016-1000027) - CVE-2016-1000027 spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization
Summary: CVE-2016-1000027 spring: HttpInvokerServiceExporter readRemoteInvocation meth...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2016-1000027
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-07-19 15:33 UTC by Andrej Nemec
Modified: 2021-06-24 15:29 UTC (History)
37 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-07-19 15:33:41 UTC


Attachments (Terms of Use)

Description Andrej Nemec 2016-07-19 15:33:23 UTC
Current installations of Pivotal's Spring Framework suffer from a potential remote code execution (RCE) issue. Depending on how the library is implemented within a product, it may or may not manifest, and authentication may be required.

External References:

https://www.tenable.com/security/research/tra-2016-20

Comment 5 Jonathan Christison 2021-06-24 14:41:55 UTC
Marking Red Hat JBoss Fuse 6 and Red Hat Fuse 7 as not affected, although versions before the documentation update (https://github.com/spring-projects/spring-framework/commit/5cbe90b2cd91b866a5a9586e460f311860e11cfa) where shipped at the time there is no use direct usage of org.springframework.remoting.httpinvoker.*

This was fixed upstream by detailing HttpInvoker endpoints should not be exposed to untrusted clients, these upstream changes would of been included with Fuse 6.3 R5 (https://access.redhat.com/errata/RHSA-2017:3115) which included a version change to 3.2.18 (3.2.17 containing the documentation fix)


Note You need to log in before you can comment on or make changes to this bug.