BWW Geeks World

Aspect Security Researchers Discover Remote Code Vulnerability in the Spring Framework

January 16
9:34 2013
Aspect Security Researchers Discover Remote Code Vulnerability in the Spring Framework

Aspect Security, a pioneer in application security, today announced that its researchers have Discovered a significant security vulnerability in the Spring Framework. Exclusive data from Sonatype, the operator of the Central Repository, the industry's primary source for open-source components, shows that more than 1.3 million vulnerable instances of the Spring Framework has been downloaded by more than 22,000 organizations worldwide.

Spring is an open-source framework used by Java developers to build business-critical applications. The Expression Language (EL) vulnerability enables an attacker to use a remote code execution to invoke functionality and take over a machine or the organization's entire network. Once an attacker exploits this weakness, the enterprise loses control of the business systems built on the Spring Framework.

Dubbed Remote Code with Expression Language Injection by Arshan Dabirsiaghi, Director of Research, Aspect Security and Stefano DiPaola, CTO of Minded Security, this flaw was Discovered nearly 20 months ago and resulted in a fix by VMware in the latest version of the Spring Framework. Further research conducted by Aspect Security engineer Dan Amodio has uncovered additional issues that elevate the severity of the flaw, and Aspect cautions that additional steps need to be taken in order to protect organizations from Expression Language Injection vulnerabilities.

"It's difficult to quantify the depth and breadth of this problem since not every application is vulnerable, but any organization using Spring 3.0.5 or earlier is still at risk as these versions do not support disabling the double EL resolution," said Amodio. "The vulnerability leads to remote code execution, which can be devastating to an entire infrastructure. Many organizations are still using outdated components, which don't provide added protections by disabling this functionality. Even more alarming is that these flawed components are still being used to build applications which can present long-term security risks if gone unmanaged."

To keep applications free from third-party attacks and performance issues, Aspect Security recommends IT managers and developers using Spring update their libraries and opt-out of enabling double EL resolution. To avoid similar security instances in the future, organizations should consider Component Lifecycle Management (CLM) products that ensure the integrity of component-based software by analyzing usage, enforcing policy during development and delivering fixes for flawed components.

Related Links
M+K Lawyers Court Storage Savings with Commvault and Pure StorageM+K Lawyers Court Storage Savings with Commvault and Pure Storage
February 10, 2016
CenturyLink Reports Fourth Quarter And Full-Year 2015 ResultsCenturyLink Reports Fourth Quarter And Full-Year 2015 Results
February 10, 2016
Rapiscan Launches MP100 Backpack Radiation Detection SystemRapiscan Launches MP100 Backpack Radiation Detection System
February 10, 2016
Cubic to Continue Supporting Simulation Training at the Joint...Cubic to Continue Supporting Simulation Training at the Joint...
February 10, 2016
Birst Named One of CRN's 20 Coolest Cloud Software Vendors of 2016 Birst Named One of CRN's 20 Coolest Cloud Software Vendors of 2016
February 10, 2016


About Author

   Subscribe to Author Alerts


GEEKS VIDEOS



Become a Fan, Follower & Subscriber

           Facebook Like Follow