renfei / www.renfei.net

任霏的个人网站与博客,基于SpringBoot开发,包含博客、相册、视频、工具箱等栏目,这个项目也是我的实验室,各种新奇的技术将在这里尝试。 https://www.renfei.net
https://www.renfei.net
Apache License 2.0
13 stars 4 forks source link

CVE-2016-1000027 (High) detected in spring-web-5.2.10.RELEASE.jar #9

Closed mend-bolt-for-github[bot] closed 3 years ago

mend-bolt-for-github[bot] commented 3 years ago

CVE-2016-1000027 - High Severity Vulnerability

Vulnerable Library - spring-web-5.2.10.RELEASE.jar

Spring Web

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: www.renfei.net/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.10.RELEASE/spring-web-5.2.10.RELEASE.jar

Dependency Hierarchy: - spring-boot-starter-web-2.3.5.RELEASE.jar (Root Library) - :x: **spring-web-5.2.10.RELEASE.jar** (Vulnerable Library)

Found in HEAD commit: a90874b1b1866fffad0101f9cd7aa65bf03a3fa8

Found in base branch: master

Vulnerability Details

Pivotal Spring Framework 4.1.4 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required.

Publish Date: 2020-01-02

URL: CVE-2016-1000027

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/spring-projects/spring-framework/commit/d9ccd618ea9cbf339eb5639d24d5a5fabe8157b5

Release Date: 2020-01-02

Fix Resolution: org.springframework:spring-web:5.3.0


Step up your Open Source Security Game with WhiteSource here