Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-8046

Опубликовано: 06 мар. 2018
Источник: redhat
CVSS3: 10

Описание

Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.

Отчет

While there might be compatibility issues upgrading Spring REST Data independently of the Spring Boot version we recommend that customers make sure they are using a fixed version of Spring Data REST 2.6.9, or 3.0.1. RHOAR has now upgraded to version 1.5.10 of Spring Boot which is compatible with fixed versions of Spring DATA Rest.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Application Runtimesspring-bootNot affected
Red Hat Fuse Intergration Services 2.0 based on Fuse 6.3 R7spring-bootFixedRHSA-2018:240514.08.2018

Показывать по

Дополнительная информация

Статус:

Critical
https://bugzilla.redhat.com/show_bug.cgi?id=1553024spring-boot: Malicious PATCH requests submitted to servers can use specially crafted JSON data to run arbitrary Java code

10 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
около 8 лет назад

Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.

CVSS3: 9.8
github
больше 3 лет назад

Remote code execution in PATCH requests in Spring Data REST

10 Critical

CVSS3