@@ -21,14 +21,17 @@ Spring Framework also provides two classes that extend <code>RemoteInvocationSer
21
21
<p >
22
22
These classes export specified beans as HTTP endpoints that deserialize data from an HTTP request
23
23
using unsafe <code >ObjectInputStream</code >. If a remote attacker can reach such endpoints,
24
- it results in remote code execution.
24
+ it results in remote code execution in the worst case.
25
+ </p >
26
+ <p >
27
+ CVE-2016-1000027 has been assigned to this issue in Spring Framework. There is no fix for that.
25
28
</p >
26
29
</overview >
27
30
28
31
<recommendation >
29
32
<p >
30
33
Avoid using <code >HttpInvokerServiceExporter</code >, <code >SimpleHttpInvokerServiceExporter</code >
31
- and other exporters that are based on <code >RemoteInvocationSerializingExporter</code >.
34
+ and any other exporter that is based on <code >RemoteInvocationSerializingExporter</code >.
32
35
Instead, use other message formats for API endpoints (for example, JSON),
33
36
but make sure that the underlying deserialization mechanism is properly configured
34
37
so that deserialization attacks are not possible. If the vulnerable exporters can not be replaced,
@@ -50,6 +53,14 @@ OWASP:
50
53
<a href =" https://www.owasp.org/index.php/Deserialization_of_untrusted_data" >Deserialization of untrusted data</a >.
51
54
</li >
52
55
<li >
56
+ Spring Framework API documentation:
57
+ <a href =" https://docs.spring.io/spring-framework/docs/current/javadoc-api/org/springframework/remoting/rmi/RemoteInvocationSerializingExporter.html" >RemoteInvocationSerializingExporter class</a >
58
+ </li >
59
+ <li >
60
+ Spring Framework API documentation:
61
+ <a href =" https://docs.spring.io/spring-framework/docs/current/javadoc-api/org/springframework/remoting/httpinvoker/HttpInvokerServiceExporter.html" >HttpInvokerServiceExporter class</a >
62
+ </li >
63
+ <li >
53
64
National Vulnerability Database:
54
65
<a href =" https://nvd.nist.gov/vuln/detail/CVE-2016-1000027" >CVE-2016-1000027</a >
55
66
</li >
@@ -66,4 +77,5 @@ OpenJDK:
66
77
<a href =" https://openjdk.java.net/jeps/290" >JEP 290: Filter Incoming Serialization Data</a >
67
78
</li >
68
79
</references >
80
+
69
81
</qhelp >
0 commit comments