Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.
CVE-2018-1273 - Critical Severity Vulnerability
Vulnerable Library - spring-data-commons-1.6.1.RELEASE.jar
Global parent pom.xml to be used by Spring Data modules
Library home page: http://www.springsource.org
Path to vulnerable library: /target/libs/provided/spring-data-commons-1.6.1.RELEASE.jar
Dependency Hierarchy: - :x: **spring-data-commons-1.6.1.RELEASE.jar** (Vulnerable Library)
Found in HEAD commit: a0333a35ad0999ab53fcccf6540d431239f0b20a
Found in base branch: main
Vulnerability Details
Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.
Publish Date: 2018-04-10
URL: CVE-2018-1273
CVSS 3 Score Details (9.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://tanzu.vmware.com/security/cve-2018-1273
Release Date: 2018-04-10
Fix Resolution: 1.13.11.RELEASE
Step up your Open Source Security Game with Mend here