Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
https://security-tracker.debian.org/tracker/CVE-2016-1000027
https://www.tenable.com/security/research/tra-2016-20
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027
https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417
https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626
Source: MITRE
Published: 2020-01-02
Updated: 2022-05-19
Type: CWE-502
Base Score: 7.5
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 10
Severity: HIGH
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 3.9
Severity: CRITICAL