{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-1000027","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-08-06T03:47:34.926Z","dateReserved":"2016-07-18T00:00:00.000Z","datePublished":"2020-01-02T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2023-04-20T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://www.tenable.com/security/research/tra-2016-20"},{"url":"https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000027.json"},{"url":"https://security-tracker.debian.org/tracker/CVE-2016-1000027"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027"},{"url":"https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626"},{"url":"https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417"},{"url":"https://spring.io/blog/2022/05/11/spring-framework-5-3-20-and-5-2-22-available-now"},{"url":"https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525"},{"url":"https://security.netapp.com/advisory/ntap-20230420-0009/"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T03:47:34.926Z"},"title":"CVE Program Container","references":[{"url":"https://www.tenable.com/security/research/tra-2016-20","tags":["x_transferred"]},{"url":"https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000027.json","tags":["x_transferred"]},{"url":"https://security-tracker.debian.org/tracker/CVE-2016-1000027","tags":["x_transferred"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027","tags":["x_transferred"]},{"url":"https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626","tags":["x_transferred"]},{"url":"https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417","tags":["x_transferred"]},{"url":"https://spring.io/blog/2022/05/11/spring-framework-5-3-20-and-5-2-22-available-now","tags":["x_transferred"]},{"url":"https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20230420-0009/","tags":["x_transferred"]}]}]}}