logo

CVE-2018-1273 org.springframework.data:spring-data-commons

Package

Manager: maven
Name: org.springframework.data:spring-data-commons
Vulnerable Version: >=1.13.0 <1.13.11 || >=2.0.0 <2.0.6

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.9399 pctl0.99882

Details

Spring Data Commons remote code injection vulnerability Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding that can lead to a remote code execution attack.

Metadata

Created: 2018-10-17T17:23:24Z
Modified: 2024-03-20T14:20:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-4fq3-mr56-cg6r/GHSA-4fq3-mr56-cg6r.json
CWE IDs: ["CWE-20", "CWE-94"]
Alternative ID: GHSA-4fq3-mr56-cg6r
Finding: F184
Auto approve: 1