saif-khan1211 / First_real_scan

Apache License 2.0
0 stars 1 forks source link

CVE-2018-1273 (Critical) detected in spring-data-commons-1.6.1.RELEASE.jar #306

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2018-1273 - Critical Severity Vulnerability

Vulnerable Library - spring-data-commons-1.6.1.RELEASE.jar

Global parent pom.xml to be used by Spring Data modules

Library home page: http://www.springsource.org

Path to vulnerable library: /target/libs/provided/spring-data-commons-1.6.1.RELEASE.jar

Dependency Hierarchy: - :x: **spring-data-commons-1.6.1.RELEASE.jar** (Vulnerable Library)

Found in HEAD commit: a0333a35ad0999ab53fcccf6540d431239f0b20a

Found in base branch: main

Vulnerability Details

Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.

Publish Date: 2018-04-10

URL: CVE-2018-1273

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://tanzu.vmware.com/security/cve-2018-1273

Release Date: 2018-04-10

Fix Resolution: 1.13.11.RELEASE


Step up your Open Source Security Game with Mend here