CVE-2018-1273

Published Apr 11, 2018

Last updated 3 days ago

Overview

Description
Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.
Source
security_alert@emc.com
NVD status
Modified

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

CVSS 2.0

Type
Primary
Base score
7.5
Impact score
6.4
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:P/I:P/A:P

Known exploits

Data from CISA

Vulnerability name
VMware Tanzu Spring Data Commons Property Binder Vulnerability
Exploit added on
Mar 25, 2022
Exploit action due
Apr 15, 2022
Required action
Apply updates per vendor instructions.

Weaknesses

security_alert@emc.com
CWE-94
nvd@nist.gov
CWE-74

Social media

Hype score
Not currently trending

Configurations