TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Major flaw in Java-based Spring Framework allows remote-code execution

77 点作者 rgarcia超过 12 年前

12 条评论

bhauer超过 12 年前
Not sure about the veracity of this, but:<p><a href="https://twitter.com/AlBaker_Dev/status/292415396684918784" rel="nofollow">https://twitter.com/AlBaker_Dev/status/292415396684918784</a><p>"That was fixed in 2011, Spring 3.0.6 and 2.5.6SEC03, enjoy!"
评论 #5082416 未加载
评论 #5083189 未加载
manishsharan超过 12 年前
This is needless scaremongering ! If you write a web application that blindly executes/evals the contents of a request parameter or submitted form data, you need to have to have your head examined and not blame the underlying framework for security vulnerability. These security experts wrote a JSP page with a intentionally flawed code that passes an incoming request parameter to an expression evaluation engine: &#60;spring:message text="" code="${param['message']}"&#62; &#60;/spring:message&#62;. what did you expect will happen?<p>No framework is invulnerable against idiot programmers.
评论 #5083174 未加载
评论 #5083519 未加载
mh8h超过 12 年前
The technical details can be found here: <a href="https://www.aspectsecurity.com/uploads/downloads/2012/12/Remote-Code-with-Expression-Language-Injection.pdf" rel="nofollow">https://www.aspectsecurity.com/uploads/downloads/2012/12/Rem...</a>
评论 #5082590 未加载
andrewcooke超过 12 年前
a rough idea of what is happening here - this is something like sql injection, but for jsp pages. if you use un-sanitized data in a jsp page, evaluated via spring's expression language, then you may execute code, provided by users, on the server.<p>(expression language can be used elsewhere, but it's not so common and much less likely to received user-supplied parameters)<p>also, this article <a href="http://www.h-online.com/open/news/item/The-ghost-of-a-Spring-Framework-bug-haunts-old-code-1786850.html" rel="nofollow">http://www.h-online.com/open/news/item/The-ghost-of-a-Spring...</a> is much clearer about affected versions (3.0.5 and below are bad; 3.0.6 can be fixed via config; 3.1 is ok)
评论 #5083187 未加载
mappu超过 12 年前
I administer some servers running a third-party java application under tomcat. How can i tell whether it uses Spring or a vulnerable template?
评论 #5082313 未加载
评论 #5082187 未加载
nnq超过 12 年前
...how is this different for complaining that "SQL is unsafe because of injection possibilities"?<p>...do real world Spring web apps <i>really</i> use unsanitized user input with "expression language" queries? (or am I totally missing the point? - not a Spring guy, I admit, but it all reads weird to me)
评论 #5083163 未加载
based2超过 12 年前
<a href="https://github.com/based2/checker-maven-plugin/blob/master/src/main/resources/java_cve.json" rel="nofollow">https://github.com/based2/checker-maven-plugin/blob/master/s...</a>
_b8r0超过 12 年前
I get quite upset when I see companies scaremonger for PR rather than try to help those who are actually doing things.<p>It seems to follow a particular pattern. Find a bug or bug class in $product. Then start screaming from the rooftops about how the sky is falling without telling people how to stop it or what the problem is. Finally release limited fix info via a mailing list or conference. In the end, everyone loses.
robomartin超过 12 年前
Is there an up-to-date document of Java security issues somewhere, preferably with explanations?<p>I don't use Java much these days but I am teaching my kids OOP using Java. I'd like to also take the opportunity to show him where the warts are.
评论 #5083011 未加载
评论 #5082421 未加载
评论 #5082442 未加载
评论 #5082554 未加载
bingo_cannon超过 12 年前
&#62; While the vulnerability that Aspect Security uncovered is not "trivial to exploit," acknowledged Williams, he has no doubt that determined attackers will do so.<p>The quotes should cover 'not' as well i.e. "not trivial to exploit".
matdrewin超过 12 年前
As long as you're not injecting unvalidated request parameters in your JSPs, you will be fine.
评论 #5082968 未加载
tonetheman超过 12 年前
Meh no worries.<p>If there is a flaw you probably need to write like 5M of XML to exploit it.