CVE-2018-1270 – org.springframework:spring-messaging
Package
Manager: maven
Name: org.springframework:spring-messaging
Vulnerable Version: >=5.0.0.release <5.0.5.release || >=0 <4.3.16.release
Severity
Level: Critical
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.88672 pctl0.99484
Details
Spring Framework allows applications to expose STOMP over WebSocket endpoints Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack.
Metadata
Created: 2018-10-17T20:05:59Z
Modified: 2025-01-31T18:51:12Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-p5hg-3xm3-gcjg/GHSA-p5hg-3xm3-gcjg.json
CWE IDs: ["CWE-358", "CWE-94"]
Alternative ID: GHSA-p5hg-3xm3-gcjg
Finding: F096
Auto approve: 1