5 Star 0 Fork 4

src-openEuler/apache-commons-exec

CVE-2025-48734

已拒绝
CVE和安全问题
创建于  
2025-07-18 09:22

一、漏洞信息
漏洞编号:CVE-2025-48734
漏洞归属组件:apache-commons-exec
漏洞归属的版本:1.3
CVSS V3.0分值:
BaseScore:8.8 High
Vector:CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
漏洞简述:
Improper Access Control vulnerability in Apache Commons.A special BeanIntrospector class was added in version 1.9.2. This can be used to stop attackers from using the declared class property of Java enum objects to get access to the classloader. However this protection was not enabled by default. PropertyUtilsBean (and consequently BeanUtilsBean) now disallows declared class level property access by default.Releases 1.11.0 and 2.0.0-M2 address a potential security issue when accessing enum properties in an uncontrolled way. If an application using Commons BeanUtils passes property paths from an external source directly to the getProperty() method of PropertyUtilsBean, an attacker can access the enum’s class loader via the “declaredClass” property available on all Java “enum” objects. Accessing the enum’s “declaredClass” allows remote attackers to access the ClassLoader and execute arbitrary code. The same issue exists with PropertyUtilsBean.getNestedProperty().Starting in versions 1.11.0 and 2.0.0-M2 a special BeanIntrospector suppresses the “declaredClass” property. Note that this new BeanIntrospector is enabled by default, but you can disable it to regain the old behavior; see section 2.5 of the user s guide and the unit tests.This issue affects Apache Commons BeanUtils 1.x before 1.11.0, and 2.x before 2.0.0-M2.Users of the artifact commons-beanutils:commons-beanutils 1.x are recommended to upgrade to version 1.11.0, which fixes the issue.Users of the artifact org.apache.commons:commons-beanutils2 2.x are recommended to upgrade to version 2.0.0-M2, which fixes the issue.
漏洞公开时间:2025-05-28 22:15:34
漏洞创建时间:2025-07-18 09:22:22
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2025-48734

更多参考(点击展开)
参考来源 参考链接 来源链接
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
https://github.com/advisories/GHSA-wxr5-93ph-8wr9
https://github.com/apache/commons-beanutils/commit/28ad955a1613ed5885870cc7da52093c1ce739dc
https://bugzilla.redhat.com/show_bug.cgi?id=2368956
https://ubuntu.com/security/CVE-2025-48734
https://www.cve.org/CVERecord?id=CVE-2025-48734
https://www.openwall.com/lists/oss-security/2025/05/28/6
https://dlcdn.apache.org/commons/beanutils/RELEASE-NOTES.txt
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://security-tracker.debian.org/tracker/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://nvd.nist.gov/vuln/detail/CVE-2025-48734
https://github.com/apache/commons-beanutils/commit/28ad955a1613ed5885870cc7da52093c1ce739dc
https://github.com/apache/commons-beanutils/commit/28ad955a1613ed5885870cc7da52093c1ce739dc
https://github.com/apache/commons-beanutils
https://github.com/apache/commons-beanutils/commit/bd20740da25b69552ddef8523beec0837297eaf9
https://www.mend.io/vulnerability-database/CVE-2025-48734
https://bugzilla.redhat.com/show_bug.cgi?id=2368956
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
https://access.redhat.com/security/cve/CVE-2025-48734
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48734
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48734
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48734
https://access.redhat.com/security/cve/CVE-2025-48734
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
https://access.redhat.com/security/cve/CVE-2025-48734
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
https://access.redhat.com/security/cve/CVE-2025-48734
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
https://access.redhat.com/security/cve/CVE-2025-48734
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
https://access.redhat.com/security/cve/CVE-2025-48734
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
https://access.redhat.com/security/cve/CVE-2025-48734
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
https://access.redhat.com/security/cve/CVE-2025-48734
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
https://access.redhat.com/security/cve/CVE-2025-48734
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
https://access.redhat.com/security/cve/CVE-2025-48734
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
https://access.redhat.com/security/cve/CVE-2025-48734
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
https://access.redhat.com/security/cve/CVE-2025-48734
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
https://access.redhat.com/security/cve/CVE-2025-48734
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
https://access.redhat.com/security/cve/CVE-2025-48734
https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9
http://www.openwall.com/lists/oss-security/2025/05/28/6
https://access.redhat.com/security/cve/CVE-2025-48734

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
其他
漏洞补丁信息:

详情(点击展开)
影响的包 修复版本 修复补丁 问题引入补丁 来源
apache/commons-beanutils https://github.com/apache/commons-beanutils/commit/bd20740da25b69552ddef8523beec0837297eaf9.patch ljqc
https://github.com/apache/commons-beanutils/commit/28ad955a1613ed5885870cc7da52093c1ce739dc redhat
https://github.com/apache/commons-beanutils/commit/28ad955a1613ed5885870cc7da52093c1ce739dc snyk
https://github.com/apache/commons-beanutils/commit/bd20740da25b69552ddef8523beec0837297eaf9 whitesource

二、漏洞分析结构反馈
影响性分析说明:

openEuler评分:

受影响版本排查(受影响/不受影响):
1.master(1.3):
2.openEuler-20.03-LTS-SP4(1.3):
3.openEuler-22.03-LTS-SP3(1.3):
4.openEuler-22.03-LTS-SP4(1.3):
5.openEuler-24.03-LTS(1.3):
6.openEuler-24.03-LTS-Next(1.3):
7.openEuler-24.03-LTS-SP1(1.3):
8.openEuler-24.03-LTS-SP2(1.3):

修复是否涉及abi变化(是/否):
1.master(1.3):
2.openEuler-20.03-LTS-SP4(1.3):
3.openEuler-22.03-LTS-SP3(1.3):
4.openEuler-22.03-LTS-SP4(1.3):
5.openEuler-24.03-LTS(1.3):
6.openEuler-24.03-LTS-Next(1.3):
7.openEuler-24.03-LTS-SP1(1.3):
8.openEuler-24.03-LTS-SP2(1.3):

原因说明:
1.master(1.3):
2.openEuler-20.03-LTS-SP4(1.3):
3.openEuler-22.03-LTS-SP3(1.3):
4.openEuler-22.03-LTS-SP4(1.3):
5.openEuler-24.03-LTS(1.3):
6.openEuler-24.03-LTS-Next(1.3):
7.openEuler-24.03-LTS-SP1(1.3):
8.openEuler-24.03-LTS-SP2(1.3):

评论 (5)

majun-bot 创建了CVE和安全问题 30天前
majun-bot 添加了
 
CVE/UNFIXED
标签
30天前
展开全部操作日志
openeuler-ci-bot 添加了
 
sig/sig-Java
标签
30天前
参考网址 关联pr 状态 补丁链接
https://nvd.nist.gov/vuln/detail/CVE-2025-48734
https://ubuntu.com/security/CVE-2025-48734
https://www.opencve.io/cve/CVE-2025-48734NoneNonehttps://github.com/apache/commons-beanutils/commit/28ad955a1613ed5885870cc7da52093c1ce739dc
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2025-48734
https://security-tracker.debian.org/tracker/CVE-2025-48734NoneNonehttps://github.com/apache/commons-beanutils/commit/28ad955a1613ed5885870cc7da52093c1ce739dc
http://www.cnnvd.org.cn/web/vulnerability/queryLds.tag?qcvCnnvdid=CVE-2025-48734

说明:补丁链接仅供初步排查参考,实际可用性请人工再次确认,补丁下载验证可使用CVE补丁工具
若补丁不准确,烦请在此issue下评论 '/report-patch 参考网址 补丁链接1,补丁链接2' 反馈正确信息,便于我们不断优化工具,不胜感激。
如 /report-patch https://security-tracker.debian.org/tracker/CVE-2021-3997 https://github.com/systemd/systemd/commit/5b1cf7a9be37e20133c0208005274ce4a5b5c6a1

openeuler-ci-bot 计划开始日期设置为2025-07-18 29天前
openeuler-ci-bot 计划截止日期设置为2025-08-01 29天前

/reason 该漏洞归属为 commons-beanutils ,软件包匹配错误

wk333 任务状态待办的 修改为已拒绝 27天前
issue状态 操作者 原因
已拒绝 wk333 该漏洞归属为 commons-beanutils ,软件包匹配错误

登录 后才可以发表评论

状态
负责人
项目
里程碑
Pull Requests
关联的 Pull Requests 被合并后可能会关闭此 issue
分支
预计工期 (小时)
开始日期   -   截止日期
-
置顶选项
优先级
关联仓库
关联里程碑
关联分支
参与者(1)
majun-bot-openMajun_admin
1
https://gitee.com/src-openeuler/apache-commons-exec.git
git@gitee.com:src-openeuler/apache-commons-exec.git
src-openeuler
apache-commons-exec
apache-commons-exec

搜索帮助