Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m929-7fr6-cvjg

Опубликовано: 17 окт. 2018
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Spring Data Commons, used in combination with XMLBeam, contains a property binder vulnerability caused by improper restriction of XML external entity references

Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used in combination with XMLBeam 1.4.14 or earlier versions, contains a property binder vulnerability caused by improper restriction of XML external entity references as underlying library XMLBeam does not restrict external reference expansion. An unauthenticated remote malicious user can supply specially crafted request parameters against Spring Data's projection-based request payload binding to access arbitrary files on the system.

Пакеты

Наименование

org.springframework.data:spring-data-commons

maven
Затронутые версииВерсия исправления

>= 1.13.0, < 1.13.12

1.13.12

Наименование

org.springframework.data:spring-data-commons

maven
Затронутые версииВерсия исправления

>= 2.0.0, < 2.0.7

2.0.7

EPSS

Процентиль: 93%
0.09831
Низкий

7.5 High

CVSS3

Дефекты

CWE-611

Связанные уязвимости

CVSS3: 7.3
redhat
больше 7 лет назад

Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used in combination with XMLBeam 1.4.14 or earlier versions, contains a property binder vulnerability caused by improper restriction of XML external entity references as underlying library XMLBeam does not restrict external reference expansion. An unauthenticated remote malicious user can supply specially crafted request parameters against Spring Data's projection-based request payload binding to access arbitrary files on the system.

CVSS3: 7.5
nvd
больше 7 лет назад

Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used in combination with XMLBeam 1.4.14 or earlier versions, contains a property binder vulnerability caused by improper restriction of XML external entity references as underlying library XMLBeam does not restrict external reference expansion. An unauthenticated remote malicious user can supply specially crafted request parameters against Spring Data's projection-based request payload binding to access arbitrary files on the system.

EPSS

Процентиль: 93%
0.09831
Низкий

7.5 High

CVSS3

Дефекты

CWE-611