Path to dependency file: /dd-java-agent/instrumentation/spring-rabbit/spring-rabbit.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-messaging/5.0.0.RELEASE/166b6391f50823bc3d234455642dc5f85ed4350d/spring-messaging-5.0.0.RELEASE.jar
Path to dependency file: /dd-java-agent/instrumentation/kafka-clients-0.11/kafka-clients-0.11.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-messaging/4.3.14.RELEASE/6d291e0857d55edba091a9ab2dbfb8346e2ac05d/spring-messaging-4.3.14.RELEASE.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-messaging/4.3.14.RELEASE/6d291e0857d55edba091a9ab2dbfb8346e2ac05d/spring-messaging-4.3.14.RELEASE.jar
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
CVE-2018-1275 - High Severity Vulnerability
Vulnerable Libraries - spring-messaging-5.0.0.RELEASE.jar, spring-messaging-4.3.14.RELEASE.jar
spring-messaging-5.0.0.RELEASE.jar
Spring Messaging
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /dd-java-agent/instrumentation/spring-rabbit/spring-rabbit.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-messaging/5.0.0.RELEASE/166b6391f50823bc3d234455642dc5f85ed4350d/spring-messaging-5.0.0.RELEASE.jar
Dependency Hierarchy: - spring-rabbit-2.0.0.RELEASE.jar (Root Library) - :x: **spring-messaging-5.0.0.RELEASE.jar** (Vulnerable Library)
spring-messaging-4.3.14.RELEASE.jar
Spring Messaging
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /dd-java-agent/instrumentation/kafka-clients-0.11/kafka-clients-0.11.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-messaging/4.3.14.RELEASE/6d291e0857d55edba091a9ab2dbfb8346e2ac05d/spring-messaging-4.3.14.RELEASE.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-messaging/4.3.14.RELEASE/6d291e0857d55edba091a9ab2dbfb8346e2ac05d/spring-messaging-4.3.14.RELEASE.jar
Dependency Hierarchy: - spring-kafka-1.3.3.RELEASE.jar (Root Library) - :x: **spring-messaging-4.3.14.RELEASE.jar** (Vulnerable Library)
Found in HEAD commit: 2819174635979a19573ec0ce8e3e2b63a3848079
Found in base branch: master
Vulnerability Details
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.
Publish Date: 2018-04-11
URL: CVE-2018-1275
CVSS 3 Score Details (9.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1275
Release Date: 2018-04-09
Fix Resolution (org.springframework:spring-messaging): 5.0.5.RELEASE
Direct dependency fix Resolution (org.springframework.amqp:spring-rabbit): 2.0.3.RELEASE
Fix Resolution (org.springframework:spring-messaging): 4.3.16.RELEASE
Direct dependency fix Resolution (org.springframework.kafka:spring-kafka): 1.3.5.RELEASE
:rescue_worker_helmet: Automatic Remediation is available for this issue