Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4fq3-mr56-cg6r

Опубликовано: 17 окт. 2018
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Spring Data Commons remote code injection vulnerability

Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding that can lead to a remote code execution attack.

Пакеты

Наименование

org.springframework.data:spring-data-commons

maven
Затронутые версииВерсия исправления

>= 1.13.0, < 1.13.11

1.13.11

Наименование

org.springframework.data:spring-data-commons

maven
Затронутые версииВерсия исправления

>= 2.0.0, < 2.0.6

2.0.6

EPSS

Процентиль: 100%
0.94288
Критический

9.8 Critical

CVSS3

Дефекты

CWE-20
CWE-94

Связанные уязвимости

CVSS3: 9.8
redhat
почти 8 лет назад

Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.

CVSS3: 9.8
nvd
почти 8 лет назад

Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.

CVSS3: 9.8
fstec
почти 8 лет назад

Уязвимость класса SimpleEvaluationContext платформы управления данными Spring Data Commons и фреймворка для создания веб-сервисов Spring Data REST, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.94288
Критический

9.8 Critical

CVSS3

Дефекты

CWE-20
CWE-94