logo

CVE-2017-8046 org.springframework.data:spring-data-rest-core

Package

Manager: maven
Name: org.springframework.data:spring-data-rest-core
Vulnerable Version: >=0 <2.6.9.release || >=3.0.0 <3.0.1.release

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

EPSS: 0.93302 pctl0.99803

Details

Remote code execution in PATCH requests in Spring Data REST Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) can use specially crafted JSON data to run arbitrary Java code.

Metadata

Created: 2022-05-13T01:02:43Z
Modified: 2022-11-04T18:40:40Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-9qf9-28h9-hqcj/GHSA-9qf9-28h9-hqcj.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-9qf9-28h9-hqcj
Finding: F184
Auto approve: 1