logo

CVE-2018-1259 org.springframework.data:spring-data-commons

Package

Manager: maven
Name: org.springframework.data:spring-data-commons
Vulnerable Version: >=1.13.0 <1.13.12 || >=2.0.0 <2.0.7

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.10293 pctl0.92889

Details

Spring Data Commons, used in combination with XMLBeam, contains a property binder vulnerability caused by improper restriction of XML external entity references Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used in combination with XMLBeam 1.4.14 or earlier versions, contains a property binder vulnerability caused by improper restriction of XML external entity references as underlying library XMLBeam does not restrict external reference expansion. An unauthenticated remote malicious user can supply specially crafted request parameters against Spring Data's projection-based request payload binding to access arbitrary files on the system.

Metadata

Created: 2018-10-17T17:23:36Z
Modified: 2022-04-27T13:58:00Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-m929-7fr6-cvjg/GHSA-m929-7fr6-cvjg.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-m929-7fr6-cvjg
Finding: F083
Auto approve: 1