CVE-2020-5411

CVSS V2 Medium 6.8 CVSS V3 High 8.1
Description
When configured to enable default typing, Jackson contained a deserialization vulnerability that could lead to arbitrary code execution. Jackson fixed this vulnerability by blacklisting known "deserialization gadgets". Spring Batch configures Jackson with global default typing enabled which means that through the previous exploit, arbitrary code could be executed if all of the following is true: * Spring Batch's Jackson support is being leveraged to serialize a job's ExecutionContext. * A malicious user gains write access to the data store used by the JobRepository (where the data to be deserialized is stored). In order to protect against this type of attack, Jackson prevents a set of untrusted gadget classes from being deserialized. Spring Batch should be proactive against blocking unknown "deserialization gadgets" when enabling default typing.
Overview
  • CVE ID
  • CVE-2020-5411
  • Assigner
  • security@pivotal.io
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2020-06-11T17:15:12
  • Last Modified Date
  • 2020-08-07T17:16:00
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:pivotal_software:spring_batch:*:*:*:*:*:*:*:* 1 OR 4.0.0 4.0.4
cpe:2.3:a:pivotal_software:spring_batch:*:*:*:*:*:*:*:* 1 OR 4.1.0 4.1.4
cpe:2.3:a:pivotal_software:spring_batch:*:*:*:*:*:*:*:* 1 OR 4.2.0 4.2.2
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.8
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • HIGH
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 8.1
  • Base Severity
  • HIGH
  • Exploitability Score
  • 2.2
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://tanzu.vmware.com/security/cve-2020-5411 Vendor Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 17:24:53 Added to TrackCVE
2022-12-04 17:58:49 2020-06-11T17:15Z 2020-06-11T17:15:12 CVE Published Date updated
2022-12-04 17:58:49 2020-08-07T17:16:00 CVE Modified Date updated
2022-12-04 17:58:49 Analyzed Vulnerability Status updated