<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for apache-commons-beanutils</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:02056-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-06-20T16:17:22Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-06-20T16:17:22Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-06-20T16:17:22Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for apache-commons-beanutils</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for apache-commons-beanutils fixes the following issues:

Update to 1.11.0:

  * Fixed Bugs:

    + BeanComparator.compare(T, T) now throws
      IllegalArgumentException instead of RuntimeException to wrap
      all cases of ReflectiveOperationException.
    + MappedMethodReference.get() now throws IllegalStateException
      instead of RuntimeException to wrap cases of
      NoSuchMethodException.
    + ResultSetIterator.get(String) now throws
      IllegalArgumentException instead of RuntimeException to wrap
      cases of SQLException.
    + ResultSetIterator.hasNext() now throws IllegalStateException
      instead of RuntimeException to wrap cases of SQLException.
    + ResultSetIterator.next() now throws IllegalStateException
      instead of RuntimeException to wrap cases of SQLException.
    + ResultSetIterator.set(String, Object) now throws
      IllegalArgumentException instead of RuntimeException to wrap
      cases of SQLException.
    + ResultSetIterator.set(String, String, Object) now throws
      IllegalArgumentException instead of RuntimeException to wrap
      cases of SQLException.

  * Changes:

    + Add org.apache.commons.beanutils
      .SuppressPropertiesBeanIntrospector.SUPPRESS_DECLARING_CLASS.
      Fixes bsc#1243793, CVE-2025-48734
    + Bump org.apache.commons:commons-parent from 81 to 84.
    + Bump commons-logging:commons-logging from 1.3.4 to 1.3.5.

Update to 1.10.1:

  * Fixed Bugs:

    + BEANUTILS-541:  FluentPropertyBeanIntrospector concurrency
      issue (backport to 1.X) #325.
    + Javadoc is missing its Overview page.
    + Remove -nouses directive from maven-bundle-plugin. OSGi
      package imports now state 'uses' definitions for package
      imports, this doesn't affect JPMS (from
      org.apache.commons:commons-parent:80).
    + Deprecate BeanUtils.BeanUtils().
    + Deprecate ConstructorUtils.ConstructorUtils().
    + Deprecate LocaleBeanUtils.LocaleBeanUtils().
    + Deprecate LocaleConvertUtils.LocaleConvertUtils().
    + Deprecate ConvertUtils.ConvertUtils().
    + Deprecate MethodUtils.MethodUtils().
    + Deprecate PropertyUtils.PropertyUtils().

  * Changes:

    + Bump org.apache.commons:commons-parent from 78 to 81.

Includes changes from 1.10.0:

  * Fixed Bugs:

    + BEANUTILS-541:  FluentPropertyBeanIntrospector caches
      corrupted writeMethod (1.x backport) #69.
    + Replace internal use of Locale.ENGLISH with Locale.ROOT.
    + Replace Maven CLIRR plugin with JApiCmp.
    + Port to Java 1.4 Throwable APIs (!).
    + Fix Javadoc generation on Java 8, 17, and 21.
    + AbstractArrayConverter.parseElements(String) now returns a
      List&lt;String&gt; instead of a raw List.

  * Changes:

    + Bump org.apache.commons:commons-parent from 47 to 78.
    + Bump Java requirement from Java 6 to 8.
    + Bump junit:junit from 4.12 to 4.13.2.
    + Bump JUnit from 4.x to 5.x 'vintage'.
    + Bump commons-logging:commons-logging from 1.2 to 1.3.4.
    + Deprecate BeanUtilsBean.initCause(Throwable, Throwable) for
      removal, use Throwable.initCause(Throwable).
    + Deprecate BeanUtils.initCause(Throwable, Throwable) for
      removal, use Throwable.initCause(Throwable).

Update to 1.9.4:

  * BEANUTILS-520: BeanUtils mitigate CVE-2014-0114

Updated to 1.9.3:

  * This is a bug fix release, which also improves the tests for
    building on Java 8.
  * Note that Java 8 and later no longer support indexed bean
    properties on java.util.List, only on arrays like String[].	
    (BEANUTILS-492). This affects PropertyUtils.getPropertyType()
    and PropertyUtils.getPropertyDescriptor(); their javadoc have
    therefore been updated to reflect this change in the JDK.

  * Changes in this version include:

    - Fixed Bugs:

      * BEANUTILS-477: Changed log level in FluentPropertyBeanIntrospector
      * BEANUTILS-492: Fixed exception when setting indexed properties
          on DynaBeans.
      * BEANUTILS-470: Precision lost when converting BigDecimal.
      * BEANUTILS-465: Indexed List Setters fixed.

    - Changes:

      * BEANUTILS-433: Update dependency from JUnit 3.8.1 to 4.12.
      * BEANUTILS-469: Update commons-logging from 1.1.1 to 1.2.
      * BEANUTILS-474: FluentPropertyBeanIntrospector does not use the
      	same naming algorithm as DefaultBeanIntrospector.
      * BEANUTILS-490: Update Java requirement from Java 5 to 6.
      * BEANUTILS-482: Update commons-collections from 3.2.1 to 3.2.2
        (CVE-2015-4852).
      * BEANUTILS-490: Update java requirement to Java 6.
      * BEANUTILS-492: IndexedPropertyDescriptor tests now pass on Java 8.
      * BEANUTILS-495: DateConverterTestBase fails on M/d/yy in Java 9.
      * BEANUTILS-496: testGetDescriptorInvalidBoolean fails on Java 9.
    - Historical list of changes:
      http://commons.apache.org/proper/commons-beanutils/changes-report.html

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-2056,SUSE-SLE-SERVER-12-SP5-LTSS-2025-2056,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2056</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502056-1/</URL>
      <Description>Link for SUSE-SU-2025:02056-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-June/040424.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:02056-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243793</URL>
      <Description>SUSE Bug 1243793</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0114/</URL>
      <Description>SUSE CVE CVE-2014-0114 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4852/</URL>
      <Description>SUSE CVE CVE-2015-4852 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-48734/</URL>
      <Description>SUSE CVE CVE-2025-48734 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP5-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS" CPE="cpe:/o:suse:sles-ltss:12:sp5">SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" CPE="cpe:/o:suse:sles-ltss-extended-security:12:sp5">SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="apache-commons-beanutils-1.11.0-7.3.1">
      <FullProductName ProductID="apache-commons-beanutils-1.11.0-7.3.1">apache-commons-beanutils-1.11.0-7.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache-commons-beanutils-javadoc-1.11.0-7.3.1">
      <FullProductName ProductID="apache-commons-beanutils-javadoc-1.11.0-7.3.1">apache-commons-beanutils-javadoc-1.11.0-7.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="apache-commons-beanutils-1.11.0-7.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-1.11.0-7.3.1">apache-commons-beanutils-1.11.0-7.3.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache-commons-beanutils-javadoc-1.11.0-7.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-javadoc-1.11.0-7.3.1">apache-commons-beanutils-javadoc-1.11.0-7.3.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache-commons-beanutils-1.11.0-7.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-1.11.0-7.3.1">apache-commons-beanutils-1.11.0-7.3.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache-commons-beanutils-javadoc-1.11.0-7.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-javadoc-1.11.0-7.3.1">apache-commons-beanutils-javadoc-1.11.0-7.3.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.</Note>
    </Notes>
    <CVE>CVE-2014-0114</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-1.11.0-7.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-javadoc-1.11.0-7.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-1.11.0-7.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-javadoc-1.11.0-7.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502056-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0114.html</URL>
        <Description>CVE-2014-0114</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/778464</URL>
        <Description>SUSE Bug 778464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/875455</URL>
        <Description>SUSE Bug 875455</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/885963</URL>
        <Description>SUSE Bug 885963</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTE: the scope of this CVE is limited to the WebLogic Server product.</Note>
    </Notes>
    <CVE>CVE-2015-4852</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-1.11.0-7.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-javadoc-1.11.0-7.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-1.11.0-7.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-javadoc-1.11.0-7.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502056-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4852.html</URL>
        <Description>CVE-2015-4852</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954102</URL>
        <Description>SUSE Bug 954102</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/955853</URL>
        <Description>SUSE Bug 955853</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper Access Control vulnerability in Apache Commons.



A special BeanIntrospector class was added in version 1.9.2. This can be used to stop attackers from using the declared class property of Java enum objects to get access to the classloader. However this protection was not enabled by default. PropertyUtilsBean (and consequently BeanUtilsBean) now disallows declared class level property access by default.





Releases 1.11.0 and 2.0.0-M2 address a potential security issue when accessing enum properties in an uncontrolled way. If an application using Commons BeanUtils passes property paths from an external source directly to the getProperty() method of PropertyUtilsBean, an attacker can access the enum's class loader via the "declaredClass" property available on all Java "enum" objects. Accessing the enum's "declaredClass" allows remote attackers to access the ClassLoader and execute arbitrary code. The same issue exists with PropertyUtilsBean.getNestedProperty().
Starting in versions 1.11.0 and 2.0.0-M2 a special BeanIntrospector suppresses the "declaredClass" property. Note that this new BeanIntrospector is enabled by default, but you can disable it to regain the old behavior; see section 2.5 of the user's guide and the unit tests.

This issue affects Apache Commons BeanUtils 1.x before 1.11.0, and 2.x before 2.0.0-M2.Users of the artifact commons-beanutils:commons-beanutils

 1.x are recommended to upgrade to version 1.11.0, which fixes the issue.


Users of the artifact org.apache.commons:commons-beanutils2

 2.x are recommended to upgrade to version 2.0.0-M2, which fixes the issue.</Note>
    </Notes>
    <CVE>CVE-2025-48734</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-1.11.0-7.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:apache-commons-beanutils-javadoc-1.11.0-7.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-1.11.0-7.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:apache-commons-beanutils-javadoc-1.11.0-7.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502056-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-48734.html</URL>
        <Description>CVE-2025-48734</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243793</URL>
        <Description>SUSE Bug 1243793</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
