You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Vulnerable Package issue exists @ Maven-org.springframework:spring-webmvc-5.3.4 in branch main
Pivotal Spring Framework (spring, spring-remoting, spring-web, spring-webmvc) before 6.0.0 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
In versions 5.3.x, the vulnerable functions were deprecated, which means that the vulnerability might only be present if those functions are used. In versions 6.x, the vulnerable versions were completely removed.
Vulnerable Package issue exists @ Maven-org.springframework:spring-webmvc-5.3.4 in branch main
Pivotal Spring Framework (spring, spring-remoting, spring-web, spring-webmvc) before 6.0.0 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
In versions 5.3.x, the vulnerable functions were deprecated, which means that the vulnerability might only be present if those functions are used. In versions 6.x, the vulnerable versions were completely removed.
Namespace: CxDemoInABoxRepos
Repository: Java-Webgoat
Repository Url: https://github.com/CxDemoInABoxRepos/Java-Webgoat
CxAST-Project: CxDemoInABoxRepos/Java-Webgoat
CxAST platform scan: 188de2bd-a9df-4b09-95f7-dd05d6f06695
Branch: main
Application: Java-Webgoat
Severity: HIGH
State: TO_VERIFY
Status: RECURRENT
CWE: CWE-502
Additional Info
Attack vector: NETWORK
Attack complexity: LOW
Confidentiality impact: HIGH
Availability impact: HIGH
Remediation Upgrade Recommendation: 6.0.0
References
Advisory
Issue
Issue
Commit
Advisory
Commit
The text was updated successfully, but these errors were encountered: