suse-su-2025:02056-1
Vulnerability from csaf_suse
Published
2025-06-20 16:17
Modified
2025-06-20 16:17
Summary
Security update for apache-commons-beanutils

Notes

Title of the patch
Security update for apache-commons-beanutils
Description of the patch
This update for apache-commons-beanutils fixes the following issues: Update to 1.11.0: * Fixed Bugs: + BeanComparator.compare(T, T) now throws IllegalArgumentException instead of RuntimeException to wrap all cases of ReflectiveOperationException. + MappedMethodReference.get() now throws IllegalStateException instead of RuntimeException to wrap cases of NoSuchMethodException. + ResultSetIterator.get(String) now throws IllegalArgumentException instead of RuntimeException to wrap cases of SQLException. + ResultSetIterator.hasNext() now throws IllegalStateException instead of RuntimeException to wrap cases of SQLException. + ResultSetIterator.next() now throws IllegalStateException instead of RuntimeException to wrap cases of SQLException. + ResultSetIterator.set(String, Object) now throws IllegalArgumentException instead of RuntimeException to wrap cases of SQLException. + ResultSetIterator.set(String, String, Object) now throws IllegalArgumentException instead of RuntimeException to wrap cases of SQLException. * Changes: + Add org.apache.commons.beanutils .SuppressPropertiesBeanIntrospector.SUPPRESS_DECLARING_CLASS. Fixes bsc#1243793, CVE-2025-48734 + Bump org.apache.commons:commons-parent from 81 to 84. + Bump commons-logging:commons-logging from 1.3.4 to 1.3.5. Update to 1.10.1: * Fixed Bugs: + BEANUTILS-541: FluentPropertyBeanIntrospector concurrency issue (backport to 1.X) #325. + Javadoc is missing its Overview page. + Remove -nouses directive from maven-bundle-plugin. OSGi package imports now state 'uses' definitions for package imports, this doesn't affect JPMS (from org.apache.commons:commons-parent:80). + Deprecate BeanUtils.BeanUtils(). + Deprecate ConstructorUtils.ConstructorUtils(). + Deprecate LocaleBeanUtils.LocaleBeanUtils(). + Deprecate LocaleConvertUtils.LocaleConvertUtils(). + Deprecate ConvertUtils.ConvertUtils(). + Deprecate MethodUtils.MethodUtils(). + Deprecate PropertyUtils.PropertyUtils(). * Changes: + Bump org.apache.commons:commons-parent from 78 to 81. Includes changes from 1.10.0: * Fixed Bugs: + BEANUTILS-541: FluentPropertyBeanIntrospector caches corrupted writeMethod (1.x backport) #69. + Replace internal use of Locale.ENGLISH with Locale.ROOT. + Replace Maven CLIRR plugin with JApiCmp. + Port to Java 1.4 Throwable APIs (!). + Fix Javadoc generation on Java 8, 17, and 21. + AbstractArrayConverter.parseElements(String) now returns a List<String> instead of a raw List. * Changes: + Bump org.apache.commons:commons-parent from 47 to 78. + Bump Java requirement from Java 6 to 8. + Bump junit:junit from 4.12 to 4.13.2. + Bump JUnit from 4.x to 5.x 'vintage'. + Bump commons-logging:commons-logging from 1.2 to 1.3.4. + Deprecate BeanUtilsBean.initCause(Throwable, Throwable) for removal, use Throwable.initCause(Throwable). + Deprecate BeanUtils.initCause(Throwable, Throwable) for removal, use Throwable.initCause(Throwable). Update to 1.9.4: * BEANUTILS-520: BeanUtils mitigate CVE-2014-0114 Updated to 1.9.3: * This is a bug fix release, which also improves the tests for building on Java 8. * Note that Java 8 and later no longer support indexed bean properties on java.util.List, only on arrays like String[]. (BEANUTILS-492). This affects PropertyUtils.getPropertyType() and PropertyUtils.getPropertyDescriptor(); their javadoc have therefore been updated to reflect this change in the JDK. * Changes in this version include: - Fixed Bugs: * BEANUTILS-477: Changed log level in FluentPropertyBeanIntrospector * BEANUTILS-492: Fixed exception when setting indexed properties on DynaBeans. * BEANUTILS-470: Precision lost when converting BigDecimal. * BEANUTILS-465: Indexed List Setters fixed. - Changes: * BEANUTILS-433: Update dependency from JUnit 3.8.1 to 4.12. * BEANUTILS-469: Update commons-logging from 1.1.1 to 1.2. * BEANUTILS-474: FluentPropertyBeanIntrospector does not use the same naming algorithm as DefaultBeanIntrospector. * BEANUTILS-490: Update Java requirement from Java 5 to 6. * BEANUTILS-482: Update commons-collections from 3.2.1 to 3.2.2 (CVE-2015-4852). * BEANUTILS-490: Update java requirement to Java 6. * BEANUTILS-492: IndexedPropertyDescriptor tests now pass on Java 8. * BEANUTILS-495: DateConverterTestBase fails on M/d/yy in Java 9. * BEANUTILS-496: testGetDescriptorInvalidBoolean fails on Java 9. - Historical list of changes: http://commons.apache.org/proper/commons-beanutils/changes-report.html
Patchnames
SUSE-2025-2056,SUSE-SLE-SERVER-12-SP5-LTSS-2025-2056,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2056
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for apache-commons-beanutils",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for apache-commons-beanutils fixes the following issues:\n\nUpdate to 1.11.0:\n\n  * Fixed Bugs:\n\n    + BeanComparator.compare(T, T) now throws\n      IllegalArgumentException instead of RuntimeException to wrap\n      all cases of ReflectiveOperationException.\n    + MappedMethodReference.get() now throws IllegalStateException\n      instead of RuntimeException to wrap cases of\n      NoSuchMethodException.\n    + ResultSetIterator.get(String) now throws\n      IllegalArgumentException instead of RuntimeException to wrap\n      cases of SQLException.\n    + ResultSetIterator.hasNext() now throws IllegalStateException\n      instead of RuntimeException to wrap cases of SQLException.\n    + ResultSetIterator.next() now throws IllegalStateException\n      instead of RuntimeException to wrap cases of SQLException.\n    + ResultSetIterator.set(String, Object) now throws\n      IllegalArgumentException instead of RuntimeException to wrap\n      cases of SQLException.\n    + ResultSetIterator.set(String, String, Object) now throws\n      IllegalArgumentException instead of RuntimeException to wrap\n      cases of SQLException.\n\n  * Changes:\n\n    + Add org.apache.commons.beanutils\n      .SuppressPropertiesBeanIntrospector.SUPPRESS_DECLARING_CLASS.\n      Fixes bsc#1243793, CVE-2025-48734\n    + Bump org.apache.commons:commons-parent from 81 to 84.\n    + Bump commons-logging:commons-logging from 1.3.4 to 1.3.5.\n\nUpdate to 1.10.1:\n\n  * Fixed Bugs:\n\n    + BEANUTILS-541:  FluentPropertyBeanIntrospector concurrency\n      issue (backport to 1.X) #325.\n    + Javadoc is missing its Overview page.\n    + Remove -nouses directive from maven-bundle-plugin. OSGi\n      package imports now state \u0027uses\u0027 definitions for package\n      imports, this doesn\u0027t affect JPMS (from\n      org.apache.commons:commons-parent:80).\n    + Deprecate BeanUtils.BeanUtils().\n    + Deprecate ConstructorUtils.ConstructorUtils().\n    + Deprecate LocaleBeanUtils.LocaleBeanUtils().\n    + Deprecate LocaleConvertUtils.LocaleConvertUtils().\n    + Deprecate ConvertUtils.ConvertUtils().\n    + Deprecate MethodUtils.MethodUtils().\n    + Deprecate PropertyUtils.PropertyUtils().\n\n  * Changes:\n\n    + Bump org.apache.commons:commons-parent from 78 to 81.\n\nIncludes changes from 1.10.0:\n\n  * Fixed Bugs:\n\n    + BEANUTILS-541:  FluentPropertyBeanIntrospector caches\n      corrupted writeMethod (1.x backport) #69.\n    + Replace internal use of Locale.ENGLISH with Locale.ROOT.\n    + Replace Maven CLIRR plugin with JApiCmp.\n    + Port to Java 1.4 Throwable APIs (!).\n    + Fix Javadoc generation on Java 8, 17, and 21.\n    + AbstractArrayConverter.parseElements(String) now returns a\n      List\u003cString\u003e instead of a raw List.\n\n  * Changes:\n\n    + Bump org.apache.commons:commons-parent from 47 to 78.\n    + Bump Java requirement from Java 6 to 8.\n    + Bump junit:junit from 4.12 to 4.13.2.\n    + Bump JUnit from 4.x to 5.x \u0027vintage\u0027.\n    + Bump commons-logging:commons-logging from 1.2 to 1.3.4.\n    + Deprecate BeanUtilsBean.initCause(Throwable, Throwable) for\n      removal, use Throwable.initCause(Throwable).\n    + Deprecate BeanUtils.initCause(Throwable, Throwable) for\n      removal, use Throwable.initCause(Throwable).\n\nUpdate to 1.9.4:\n\n  * BEANUTILS-520: BeanUtils mitigate CVE-2014-0114\n\nUpdated to 1.9.3:\n\n  * This is a bug fix release, which also improves the tests for\n    building on Java 8.\n  * Note that Java 8 and later no longer support indexed bean\n    properties on java.util.List, only on arrays like String[].\t\n    (BEANUTILS-492). This affects PropertyUtils.getPropertyType()\n    and PropertyUtils.getPropertyDescriptor(); their javadoc have\n    therefore been updated to reflect this change in the JDK.\n\n  * Changes in this version include:\n\n    - Fixed Bugs:\n\n      * BEANUTILS-477: Changed log level in FluentPropertyBeanIntrospector\n      * BEANUTILS-492: Fixed exception when setting indexed properties\n          on DynaBeans.\n      * BEANUTILS-470: Precision lost when converting BigDecimal.\n      * BEANUTILS-465: Indexed List Setters fixed.\n\n    - Changes:\n\n      * BEANUTILS-433: Update dependency from JUnit 3.8.1 to 4.12.\n      * BEANUTILS-469: Update commons-logging from 1.1.1 to 1.2.\n      * BEANUTILS-474: FluentPropertyBeanIntrospector does not use the\n      \tsame naming algorithm as DefaultBeanIntrospector.\n      * BEANUTILS-490: Update Java requirement from Java 5 to 6.\n      * BEANUTILS-482: Update commons-collections from 3.2.1 to 3.2.2\n        (CVE-2015-4852).\n      * BEANUTILS-490: Update java requirement to Java 6.\n      * BEANUTILS-492: IndexedPropertyDescriptor tests now pass on Java 8.\n      * BEANUTILS-495: DateConverterTestBase fails on M/d/yy in Java 9.\n      * BEANUTILS-496: testGetDescriptorInvalidBoolean fails on Java 9.\n    - Historical list of changes:\n      http://commons.apache.org/proper/commons-beanutils/changes-report.html\n\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2025-2056,SUSE-SLE-SERVER-12-SP5-LTSS-2025-2056,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2056",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02056-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2025:02056-1",
        "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502056-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2025:02056-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040424.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243793",
        "url": "https://bugzilla.suse.com/1243793"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-0114 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-0114/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-4852 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-4852/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-48734 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-48734/"
      }
    ],
    "title": "Security update for apache-commons-beanutils",
    "tracking": {
      "current_release_date": "2025-06-20T16:17:22Z",
      "generator": {
        "date": "2025-06-20T16:17:22Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2025:02056-1",
      "initial_release_date": "2025-06-20T16:17:22Z",
      "revision_history": [
        {
          "date": "2025-06-20T16:17:22Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache-commons-beanutils-1.11.0-7.3.1.noarch",
                "product": {
                  "name": "apache-commons-beanutils-1.11.0-7.3.1.noarch",
                  "product_id": "apache-commons-beanutils-1.11.0-7.3.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch",
                "product": {
                  "name": "apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch",
                  "product_id": "apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache-commons-beanutils-1.11.0-7.3.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-1.11.0-7.3.1.noarch"
        },
        "product_reference": "apache-commons-beanutils-1.11.0-7.3.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch"
        },
        "product_reference": "apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache-commons-beanutils-1.11.0-7.3.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-1.11.0-7.3.1.noarch"
        },
        "product_reference": "apache-commons-beanutils-1.11.0-7.3.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch"
        },
        "product_reference": "apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2014-0114",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-0114"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-1.11.0-7.3.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-1.11.0-7.3.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-0114",
          "url": "https://www.suse.com/security/cve/CVE-2014-0114"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 778464 for CVE-2014-0114",
          "url": "https://bugzilla.suse.com/778464"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 875455 for CVE-2014-0114",
          "url": "https://bugzilla.suse.com/875455"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 885963 for CVE-2014-0114",
          "url": "https://bugzilla.suse.com/885963"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-1.11.0-7.3.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-1.11.0-7.3.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-06-20T16:17:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2014-0114"
    },
    {
      "cve": "CVE-2015-4852",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-4852"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTE: the scope of this CVE is limited to the WebLogic Server product.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-1.11.0-7.3.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-1.11.0-7.3.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-4852",
          "url": "https://www.suse.com/security/cve/CVE-2015-4852"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 954102 for CVE-2015-4852",
          "url": "https://bugzilla.suse.com/954102"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 955853 for CVE-2015-4852",
          "url": "https://bugzilla.suse.com/955853"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-1.11.0-7.3.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-1.11.0-7.3.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-1.11.0-7.3.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-1.11.0-7.3.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-06-20T16:17:22Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2015-4852"
    },
    {
      "cve": "CVE-2025-48734",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-48734"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper Access Control vulnerability in Apache Commons.\n\n\n\nA special BeanIntrospector class was added in version 1.9.2. This can be used to stop attackers from using the declared class property of Java enum objects to get access to the classloader. However this protection was not enabled by default. PropertyUtilsBean (and consequently BeanUtilsBean) now disallows declared class level property access by default.\n\n\n\n\n\nReleases 1.11.0 and 2.0.0-M2 address a potential security issue when accessing enum properties in an uncontrolled way. If an application using Commons BeanUtils passes property paths from an external source directly to the getProperty() method of PropertyUtilsBean, an attacker can access the enum\u0027s class loader via the \"declaredClass\" property available on all Java \"enum\" objects. Accessing the enum\u0027s \"declaredClass\" allows remote attackers to access the ClassLoader and execute arbitrary code. The same issue exists with PropertyUtilsBean.getNestedProperty().\nStarting in versions 1.11.0 and 2.0.0-M2 a special BeanIntrospector suppresses the \"declaredClass\" property. Note that this new BeanIntrospector is enabled by default, but you can disable it to regain the old behavior; see section 2.5 of the user\u0027s guide and the unit tests.\n\nThis issue affects Apache Commons BeanUtils 1.x before 1.11.0, and 2.x before 2.0.0-M2.Users of the artifact commons-beanutils:commons-beanutils\n\n 1.x are recommended to upgrade to version 1.11.0, which fixes the issue.\n\n\nUsers of the artifact org.apache.commons:commons-beanutils2\n\n 2.x are recommended to upgrade to version 2.0.0-M2, which fixes the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-1.11.0-7.3.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-1.11.0-7.3.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-48734",
          "url": "https://www.suse.com/security/cve/CVE-2025-48734"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1243793 for CVE-2025-48734",
          "url": "https://bugzilla.suse.com/1243793"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-1.11.0-7.3.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-1.11.0-7.3.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-1.11.0-7.3.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-1.11.0-7.3.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-javadoc-1.11.0-7.3.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-06-20T16:17:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-48734"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…