CVE-2010-1622

SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:fusion_middleware:7.6.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:fusion_middleware:11.1.1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:fusion_middleware:11.1.1.8.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:springsource:spring_framework:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:2.5.5:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:2.5.7:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:3.0.2:*:*:*:*:*:*:*

History

13 Feb 2023, 04:17

Type Values Removed Values Added
References
  • {'url': 'https://access.redhat.com/errata/RHSA-2011:0175', 'name': 'https://access.redhat.com/errata/RHSA-2011:0175', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=606706', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=606706', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/CVE-2010-1622', 'name': 'https://access.redhat.com/security/cve/CVE-2010-1622', 'tags': [], 'refsource': 'MISC'}
Summary CVE-2010-1622 SpringSource Spring Framework (x < 2.5.6.SEC02, 2.5.7.SR01, 3.0.3): Arbitrary Java code execution via an HTTP request containing a specially-crafted .jar file SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.

02 Feb 2023, 17:17

Type Values Removed Values Added
References
  • (MISC) https://access.redhat.com/errata/RHSA-2011:0175 -
  • (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=606706 -
  • (MISC) https://access.redhat.com/security/cve/CVE-2010-1622 -
Summary SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file. CVE-2010-1622 SpringSource Spring Framework (x < 2.5.6.SEC02, 2.5.7.SR01, 3.0.3): Arbitrary Java code execution via an HTTP request containing a specially-crafted .jar file

Information

Published : 2010-06-21 16:30

Updated : 2023-12-10 11:03


NVD link : CVE-2010-1622

Mitre link : CVE-2010-1622

CVE.ORG link : CVE-2010-1622


JSON object : View

Products Affected

springsource

  • spring_framework

oracle

  • fusion_middleware
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')