BWW Geeks World

Aspect Security Researchers Discover Remote Code Vulnerability in the Spring Framework

Related: Security
Aspect Security Researchers Discover Remote Code Vulnerability in the Spring Framework

Aspect Security, a pioneer in application security, today announced that its researchers have Discovered a significant security vulnerability in the Spring Framework. Exclusive data from Sonatype, the operator of the Central Repository, the industry's primary source for open-source components, shows that more than 1.3 million vulnerable instances of the Spring Framework has been downloaded by more than 22,000 organizations worldwide.

Spring is an open-source framework used by Java developers to build business-critical applications. The Expression Language (EL) vulnerability enables an attacker to use a remote code execution to invoke functionality and take over a machine or the organization's entire network. Once an attacker exploits this weakness, the enterprise loses control of the business systems built on the Spring Framework.

Dubbed Remote Code with Expression Language Injection by Arshan Dabirsiaghi, Director of Research, Aspect Security and Stefano DiPaola, CTO of Minded Security, this flaw was Discovered nearly 20 months ago and resulted in a fix by VMware in the latest version of the Spring Framework. Further research conducted by Aspect Security engineer Dan Amodio has uncovered additional issues that elevate the severity of the flaw, and Aspect cautions that additional steps need to be taken in order to protect organizations from Expression Language Injection vulnerabilities.

"It's difficult to quantify the depth and breadth of this problem since not every application is vulnerable, but any organization using Spring 3.0.5 or earlier is still at risk as these versions do not support disabling the double EL resolution," said Amodio. "The vulnerability leads to remote code execution, which can be devastating to an entire infrastructure. Many organizations are still using outdated components, which don't provide added protections by disabling this functionality. Even more alarming is that these flawed components are still being used to build applications which can present long-term security risks if gone unmanaged."

To keep applications free from third-party attacks and performance issues, Aspect Security recommends IT managers and developers using Spring update their libraries and opt-out of enabling double EL resolution. To avoid similar security instances in the future, organizations should consider Component Lifecycle Management (CLM) products that ensure the integrity of component-based software by analyzing usage, enforcing policy during development and delivering fixes for flawed components.

Related Links
tw telecom Delivers Business Ethernet Solutions to Springs Hosting Data Center in Colorado Springstw telecom Delivers Business Ethernet Solutions to Springs Hosting Data Center in Colorado Springs
August 27, 2014
Drexel Hamilton to Hold Telecom, Media and Technology Conference on September 3 and 4 in NYCDrexel Hamilton to Hold Telecom, Media and Technology Conference on September 3 and 4 in NYC
August 27, 2014
Annual General Meeting of Addtech AB 27 August 2014Annual General Meeting of Addtech AB 27 August 2014
August 27, 2014
HotLink Hybrid Express Wins Gold in Public and Hybrid Cloud Computing Category for Best of VMworld 2014 AwardsHotLink Hybrid Express Wins Gold in Public and Hybrid Cloud Computing Category for Best of VMworld 2014 Awards
August 27, 2014
Major Mobile Banking Security Flaws Identified and Solved with SnoopWall's Privacy Shield''Major Mobile Banking Security Flaws Identified and Solved with SnoopWall's Privacy Shield''
August 27, 2014


About Author

Subscribe to Author Alerts

Become a Fan, Follower & Subscriber