Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2011-10-04T10:00:00

Updated: 2022-07-17T19:35:42

Reserved: 2011-07-27T00:00:00


Link: CVE-2011-2894

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2011-10-04T10:55:09.363

Modified: 2022-07-17T20:15:08.153


Link: CVE-2011-2894

JSON object: View

cve-icon Redhat Information

No data.

CWE