Bug 1565923 (CVE-2018-1273) - CVE-2018-1273 spring-data-commons: Improper neutralization of special elements allow remote attackers to execute code via crafted requests
Summary: CVE-2018-1273 spring-data-commons: Improper neutralization of special element...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2018-1273
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1565924
TreeView+ depends on / blocked
 
Reported: 2018-04-11 04:25 UTC by Sam Fowler
Modified: 2021-10-21 19:59 UTC (History)
11 users (show)

Fixed In Version: spring-data-commons 1.13.11, spring-data-commons 2.0.6
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-10-21 19:59:07 UTC
Embargoed:


Attachments (Terms of Use)

Description Sam Fowler 2018-04-11 04:25:41 UTC
Spring Data Commons, versions 1.13 to 1.13.10 and 2.0 to 2.0.5, , contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data’s projection-based request payload binding hat can lead to a remote code execution attack.


External References:

https://pivotal.io/security/cve-2018-1273


Upstream Issue:

https://jira.spring.io/browse/DATACMNS-1282


Upstream Patches:

https://github.com/spring-projects/spring-data-commons/commit/b1a20ae1e82a63f99b3afc6f2aaedb3bf4dc432a
https://github.com/spring-projects/spring-data-commons/commit/ae1dd2741ce06d44a0966ecbd6f47beabde2b653


Note You need to log in before you can comment on or make changes to this bug.