CVE-2018-1272 – org.springframework:spring-core
Package
Manager: maven
Name: org.springframework:spring-core
Vulnerable Version: >=0 <4.3.15 || >=5.0.0 <5.0.5
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.02166 pctl0.83657
Details
Possible privilege escalation in org.springframework:spring-core Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.
Metadata
Created: 2018-10-17T20:27:47Z
Modified: 2024-03-08T20:42:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-4487-x383-qpph/GHSA-4487-x383-qpph.json
CWE IDs: []
Alternative ID: GHSA-4487-x383-qpph
Finding: F184
Auto approve: 1