| CVE-ID |
CVE-2017-4995
|
• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information
|
| Description |
| An issue was discovered in Pivotal Spring Security 4.2.0.RELEASE
through 4.2.2.RELEASE, and Spring Security 5.0.0.M1. When configured to
enable default typing, Jackson contained a deserialization
vulnerability that could lead to arbitrary code execution. Jackson
fixed this vulnerability by blacklisting known "deserialization
gadgets." Spring Security configures Jackson with global default typing
enabled, which means that (through the previous exploit) arbitrary code
could be executed if all of the following is true: (1) Spring
Security's Jackson support is being leveraged by invoking
SecurityJackson2Modules.getModules(ClassLoader) or
SecurityJackson2Modules.enableDefaultTyping(ObjectMapper); (2) Jackson
is used to deserialize data that is not trusted (Spring Security does
not perform deserialization using Jackson, so this is an explicit
choice of the user); and (3) there is an unknown (Jackson is not
blacklisting it already) "deserialization gadget" that allows code
execution present on the classpath. Jackson provides a blacklisting
approach to protecting against this type of attack, but Spring Security
should be proactive against blocking unknown "deserialization gadgets"
when Spring Security enables default typing.
|
| References |
|
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
|
|
|
| Assigning CNA |
| Dell EMC |
| Date Entry Created |
| 20161229 |
Disclaimer: The entry creation date may reflect when
the CVE ID was allocated or reserved, and does not
necessarily indicate when this vulnerability was
discovered, shared with the affected vendor, publicly
disclosed, or updated in CVE.
|
| Phase (Legacy) |
| Assigned (20161229) |
| Votes (Legacy) |
|
| Comments (Legacy) |
|
| Proposed (Legacy) |
| N/A |
|
This is an entry on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities. |
|
|
|
For More Information: cve@mitre.org
|