logo

CVE-2018-1275 org.springframework:spring-messaging

Package

Manager: maven
Name: org.springframework:spring-messaging
Vulnerable Version: >=0 <4.3.16.release || >=5.0.0.release <5.0.5.release

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.32447 pctl0.96707

Details

Spring Framework has Improperly Implemented Security Check for Standard Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.

Metadata

Created: 2018-10-17T20:28:00Z
Modified: 2025-01-31T19:35:35Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-3rmv-2pg5-xvqj/GHSA-3rmv-2pg5-xvqj.json
CWE IDs: ["CWE-358", "CWE-94"]
Alternative ID: GHSA-3rmv-2pg5-xvqj
Finding: F096
Auto approve: 1