Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1564408 - (CVE-2018-1272) CVE-2018-1272 spring-framework: Multipart content pollution
CVE-2018-1272 spring-framework: Multipart content pollution
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20180405,reported=2...
: Security
Depends On: 1564409
Blocks: 1564412
  Show dependency treegraph
 
Reported: 2018-04-06 04:02 EDT by Andrej Nemec
Modified: 2018-10-19 17:48 EDT (History)
92 users (show)

See Also:
Fixed In Version: springframework 5.0.5, springframework 4.3.15
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:1320 None None None 2018-05-03 13:06 EDT
Red Hat Product Errata RHSA-2018:2669 None None None 2018-09-11 03:55 EDT

  None (edit)
Description Andrej Nemec 2018-04-06 04:02:43 EDT
Spring Framework provides client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.

In order for the attacker to succeed, they would have to be able to guess the multipart boundary value chosen by server A for the multipart request to server B, which requires the attacker to also have control of the server or the ability to see the HTTP log of server A through a separate attack vector.

External References:

https://pivotal.io/security/cve-2018-1272
Comment 1 Andrej Nemec 2018-04-06 04:03:29 EDT
Created springframework tracking bugs for this issue:

Affects: fedora-all [bug 1564409]
Comment 3 errata-xmlrpc 2018-05-03 13:06:15 EDT
This issue has been addressed in the following products:

  Red Hat Openshift Application Runtimes

Via RHSA-2018:1320 https://access.redhat.com/errata/RHSA-2018:1320
Comment 4 Happy Mia 2018-06-20 04:57:33 EDT
(In reply to Andrej Nemec from comment #0)
> Spring Framework provides client-side support for multipart requests. When
> Spring MVC or Spring WebFlux server application (server A) receives input
> from a remote client, and then uses that input to make a multipart request
> to another server (server B), it can be exposed to an attack, where an extra
> multipart is inserted in the content of the request from server A, causing
> server B to use the wrong value for a part it expects. This could to lead
> privilege escalation, for example, if the part content represents a username
> or user roles.
> 
> In order for the attacker to succeed, they would have to be able to guess
> the multipart boundary value chosen by server A for the multipart request to
> server B, which requires the attacker to also have control of the server or
> the ability to see the HTTP log of server A through a separate attack vector.
> 
> External References:
> 
> https://pivotal.io/security/cve-2018-1272

I want to reproduce the CVE-2018-1272 vulnerability in my project.
Please explain me how to attack this vulnerability. Thanks!
Comment 5 Andrej Nemec 2018-06-20 05:00:22 EDT
(In reply to Happy Mia from comment #4)
> (In reply to Andrej Nemec from comment #0)
> > Spring Framework provides client-side support for multipart requests. When
> > Spring MVC or Spring WebFlux server application (server A) receives input
> > from a remote client, and then uses that input to make a multipart request
> > to another server (server B), it can be exposed to an attack, where an extra
> > multipart is inserted in the content of the request from server A, causing
> > server B to use the wrong value for a part it expects. This could to lead
> > privilege escalation, for example, if the part content represents a username
> > or user roles.
> > 
> > In order for the attacker to succeed, they would have to be able to guess
> > the multipart boundary value chosen by server A for the multipart request to
> > server B, which requires the attacker to also have control of the server or
> > the ability to see the HTTP log of server A through a separate attack vector.
> > 
> > External References:
> > 
> > https://pivotal.io/security/cve-2018-1272
> 
> I want to reproduce the CVE-2018-1272 vulnerability in my project.
> Please explain me how to attack this vulnerability. Thanks!

Red Hat Product Security Team does not provide reproducers for security issues to external parties.
Comment 6 errata-xmlrpc 2018-09-11 03:54:36 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Fuse

Via RHSA-2018:2669 https://access.redhat.com/errata/RHSA-2018:2669

Note You need to log in before you can comment on or make changes to this bug.