BWW Geeks World

Aspect Security Researchers Discover Remote Code Vulnerability in the Spring Framework

January 16
9:34 2013
Aspect Security Researchers Discover Remote Code Vulnerability in the Spring Framework

Aspect Security, a pioneer in application security, today announced that its researchers have Discovered a significant security vulnerability in the Spring Framework. Exclusive data from Sonatype, the operator of the Central Repository, the industry's primary source for open-source components, shows that more than 1.3 million vulnerable instances of the Spring Framework has been downloaded by more than 22,000 organizations worldwide.

Spring is an open-source framework used by Java developers to build business-critical applications. The Expression Language (EL) vulnerability enables an attacker to use a remote code execution to invoke functionality and take over a machine or the organization's entire network. Once an attacker exploits this weakness, the enterprise loses control of the business systems built on the Spring Framework.

Dubbed Remote Code with Expression Language Injection by Arshan Dabirsiaghi, Director of Research, Aspect Security and Stefano DiPaola, CTO of Minded Security, this flaw was Discovered nearly 20 months ago and resulted in a fix by VMware in the latest version of the Spring Framework. Further research conducted by Aspect Security engineer Dan Amodio has uncovered additional issues that elevate the severity of the flaw, and Aspect cautions that additional steps need to be taken in order to protect organizations from Expression Language Injection vulnerabilities.

"It's difficult to quantify the depth and breadth of this problem since not every application is vulnerable, but any organization using Spring 3.0.5 or earlier is still at risk as these versions do not support disabling the double EL resolution," said Amodio. "The vulnerability leads to remote code execution, which can be devastating to an entire infrastructure. Many organizations are still using outdated components, which don't provide added protections by disabling this functionality. Even more alarming is that these flawed components are still being used to build applications which can present long-term security risks if gone unmanaged."

To keep applications free from third-party attacks and performance issues, Aspect Security recommends IT managers and developers using Spring update their libraries and opt-out of enabling double EL resolution. To avoid similar security instances in the future, organizations should consider Component Lifecycle Management (CLM) products that ensure the integrity of component-based software by analyzing usage, enforcing policy during development and delivering fixes for flawed components.

Related Links
FTC and Lockheed Martin Win 2016 ACT-IAC Dynamite Award for the Innovative Impact of IdentityTheft.govFTC and Lockheed Martin Win 2016 ACT-IAC Dynamite Award for the Innovative Impact of IdentityTheft.gov
May 03, 2016
Liberty Receives Interlogix Partner of the Year AwardLiberty Receives Interlogix Partner of the Year Award
May 03, 2016
Revel Systems to Showcase iPad Point of Sale Platform with Chef Robert Irvine at the 2016 National Restaurant Association ShowRevel Systems to Showcase iPad Point of Sale Platform with Chef Robert Irvine at the 2016 National Restaurant Association Show
May 03, 2016
HighPoint Solutions Launches Clinical Trial Design Tool, a Salesforce Fullforce Solution for Life Sciences R&DHighPoint Solutions Launches Clinical Trial Design Tool, a Salesforce Fullforce Solution for Life Sciences R&D
May 03, 2016
Enterprise File Sharing and Synchronization (EFSS) Market worth 3.51 Billion USD by 2020Enterprise File Sharing and Synchronization (EFSS) Market worth 3.51 Billion USD by 2020
May 03, 2016


About Author

   Subscribe to Author Alerts

GEEKS VIDEOS



Become a Fan, Follower & Subscriber

           Facebook Like Follow