Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xx65-cc7g-9pfp

Опубликовано: 18 окт. 2018
Источник: github
Github: Прошло ревью
CVSS3: 5.9

Описание

Moderate severity vulnerability that affects org.springframework.boot:spring-boot

Spring Boot supports an embedded launch script that can be used to easily run the application as a systemd or init.d linux service. The script included with Spring Boot 1.5.9 and earlier and 2.0.0.M1 through 2.0.0.M7 is susceptible to a symlink attack which allows the "run_user" to overwrite and take ownership of any file on the same system. In order to instigate the attack, the application must be installed as a service and the "run_user" requires shell access to the server. Spring Boot application that are not installed as a service, or are not using the embedded launch script are not susceptible.

Пакеты

Наименование

org.springframework.boot:spring-boot

maven
Затронутые версииВерсия исправления

>= 1.5.0, < 1.5.10

1.5.10

EPSS

Процентиль: 69%
0.00604
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-59

Связанные уязвимости

CVSS3: 6.8
redhat
больше 7 лет назад

Spring Boot supports an embedded launch script that can be used to easily run the application as a systemd or init.d linux service. The script included with Spring Boot 1.5.9 and earlier and 2.0.0.M1 through 2.0.0.M7 is susceptible to a symlink attack which allows the "run_user" to overwrite and take ownership of any file on the same system. In order to instigate the attack, the application must be installed as a service and the "run_user" requires shell access to the server. Spring Boot application that are not installed as a service, or are not using the embedded launch script are not susceptible.

CVSS3: 5.9
nvd
больше 7 лет назад

Spring Boot supports an embedded launch script that can be used to easily run the application as a systemd or init.d linux service. The script included with Spring Boot 1.5.9 and earlier and 2.0.0.M1 through 2.0.0.M7 is susceptible to a symlink attack which allows the "run_user" to overwrite and take ownership of any file on the same system. In order to instigate the attack, the application must be installed as a service and the "run_user" requires shell access to the server. Spring Boot application that are not installed as a service, or are not using the embedded launch script are not susceptible.

EPSS

Процентиль: 69%
0.00604
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-59