This repository has been archived by the owner on Jan 12, 2024. It is now read-only.
CVE-2016-1000027 (High) detected in spring-web-5.2.0.RELEASE.jar - autoclosed #18
Labels
security vulnerability
Security vulnerability detected by WhiteSource
CVE-2016-1000027 - High Severity Vulnerability
Spring Web
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: remote-device-client/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.0.RELEASE/spring-web-5.2.0.RELEASE.jar
Dependency Hierarchy:
Found in HEAD commit: 772c0e629e3808cf31104e97f73dbd1621b76476
Found in base branch: master
Pivotal Spring Framework 4.1.4 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required.
Publish Date: 2020-01-02
URL: CVE-2016-1000027
Base Score Metrics:
Type: Upgrade version
Origin: spring-projects/spring-framework#25379
Release Date: 2020-01-02
Fix Resolution: org.springframework:spring-web:5.3.0
The text was updated successfully, but these errors were encountered: