CVE-2018-1273 – org.springframework.data:spring-data-commons
Package
Manager: maven
Name: org.springframework.data:spring-data-commons
Vulnerable Version: >=1.13.0 <1.13.11 || >=2.0.0 <2.0.6
Severity
Level: Critical
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.9399 pctl0.99882
Details
Spring Data Commons remote code injection vulnerability Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding that can lead to a remote code execution attack.
Metadata
Created: 2018-10-17T17:23:24Z
Modified: 2024-03-20T14:20:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-4fq3-mr56-cg6r/GHSA-4fq3-mr56-cg6r.json
CWE IDs: ["CWE-20", "CWE-94"]
Alternative ID: GHSA-4fq3-mr56-cg6r
Finding: F184
Auto approve: 1