Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.
References
Link | Resource |
---|---|
https://pivotal.io/security/cve-2018-1273 | Vendor Advisory |
http://mail-archives.apache.org/mod_mbox/ignite-dev/201807.mbox/%3CCAK0qHnqzfzmCDFFi6c5Jok19zNkVCz5Xb4sU%3D0f2J_1i4p46zQ%40mail.gmail.com%3E | Mailing List Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2018-04-11 06:29
Updated : 2022-07-25 11:15
NVD link : CVE-2018-1273
Mitre link : CVE-2018-1273
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
pivotal_software
- spring_data_rest
- spring_data_commons
apache
- ignite