This repository has been archived by the owner on Oct 2, 2023. It is now read-only.
CVE-2018-1273 (Critical) detected in spring-data-commons-1.11.0.RELEASE.jar #170
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2018-1273 - Critical Severity Vulnerability
Vulnerable Library - spring-data-commons-1.11.0.RELEASE.jar
Global parent pom.xml to be used by Spring Data modules
Library home page: http://www.spring.io/spring-data
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/data/spring-data-commons/1.11.0.RELEASE/spring-data-commons-1.11.0.RELEASE.jar
Dependency Hierarchy:
Found in HEAD commit: 4c8d5a1732722418ec10d2f1f5fd7e7a6e43c83b
Found in base branch: master
Vulnerability Details
Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.
Publish Date: 2018-04-11
URL: CVE-2018-1273
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://tanzu.vmware.com/security/cve-2018-1273
Release Date: 2018-04-10
Fix Resolution (org.springframework.data:spring-data-commons): 1.13.11.RELEASE
Direct dependency fix Resolution (com.capitalone.dashboard:core): 3.10.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: