Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1565923 - (CVE-2018-1273) CVE-2018-1273 spring-data-commons: Improper neutralization of special elements allow remote attackers to execute code via crafted requests
CVE-2018-1273 spring-data-commons: Improper neutralization of special element...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
urgent Severity urgent
: ---
: ---
Assigned To: Red Hat Product Security
impact=critical,public=20180327,repor...
: Security
Depends On:
Blocks: 1565924
  Show dependency treegraph
 
Reported: 2018-04-11 00:25 EDT by Sam Fowler
Modified: 2018-05-16 21:56 EDT (History)
13 users (show)

See Also:
Fixed In Version: spring-data-commons 1.13.11, spring-data-commons 2.0.6
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Sam Fowler 2018-04-11 00:25:41 EDT
Spring Data Commons, versions 1.13 to 1.13.10 and 2.0 to 2.0.5, , contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data’s projection-based request payload binding hat can lead to a remote code execution attack.


External References:

https://pivotal.io/security/cve-2018-1273


Upstream Issue:

https://jira.spring.io/browse/DATACMNS-1282


Upstream Patches:

https://github.com/spring-projects/spring-data-commons/commit/b1a20ae1e82a63f99b3afc6f2aaedb3bf4dc432a
https://github.com/spring-projects/spring-data-commons/commit/ae1dd2741ce06d44a0966ecbd6f47beabde2b653

Note You need to log in before you can comment on or make changes to this bug.