CVE Database


Impact: Important
Public: 2010-06-17
Bugzilla: 606706: CVE-2010-1622 SpringSource Spring Framework (x < 2.5.6.SEC02, 2.5.7.SR01, 3.0.3): Arbitrary Java code execution via an HTTP request containing a specially-crafted .jar file


The MITRE CVE dictionary describes this issue as:

SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.

Find out more about CVE-2010-1622 from the MITRE CVE dictionary and NIST NVD.


This issue did not affect the versions of the SpringSource Spring Framework, as shipped with JBoss Enterprise Application Platform v4.2.0, v4.3.0, or v.5.0.0.

CVSS v2 metrics

Base Score: 7.5
Base Metrics: AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector: Network
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat JBoss Web Framework Kit 1.0.0 for RHEL 5 Server (jboss-wfk-1.0.0-uninstall) RHSA-2011:0175 January 25, 2011
Red Hat JBoss Web Framework Kit 5.0.0 for RHEL 4 AS (jboss-wfk-1.0.0-uninstall) RHSA-2011:0175 January 25, 2011

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.