← Zuruck zu CVEs
CVE-2018-1275
CRITICAL9.8
Beschreibung
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht4/11/2018
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
oracle:application_testing_suiteoracle:big_data_discoveryoracle:communications_converged_application_serveroracle:communications_diameter_signaling_routeroracle:communications_performance_intelligence_centeroracle:communications_services_gatekeeperoracle:goldengate_for_big_dataoracle:health_sciences_information_manageroracle:healthcare_master_person_indexoracle:insurance_calculation_engineoracle:insurance_rules_paletteoracle:primavera_gatewayoracle:retail_customer_insightsoracle:retail_open_commerce_platformoracle:retail_order_brokeroracle:retail_predictive_application_serveroracle:service_architecture_leveraging_tuxedooracle:tape_library_acslsvmware:spring_framework
Schwachen (CWE)
CWE-94CWE-358
Referenzen
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html(security_alert@emc.com)
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html(security_alert@emc.com)
http://www.securityfocus.com/bid/103771(security_alert@emc.com)
http://www.securitytracker.com/id/1041301(security_alert@emc.com)
https://access.redhat.com/errata/RHSA-2018:1320(security_alert@emc.com)
https://access.redhat.com/errata/RHSA-2018:2939(security_alert@emc.com)
https://lists.apache.org/thread.html/4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe%40%3Cissues.activemq.apache.org%3E(security_alert@emc.com)
https://lists.apache.org/thread.html/ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c%40%3Cissues.activemq.apache.org%3E(security_alert@emc.com)
https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369%40%3Cissues.activemq.apache.org%3E(security_alert@emc.com)
https://pivotal.io/security/cve-2018-1275(security_alert@emc.com)
https://www.oracle.com/security-alerts/cpujul2020.html(security_alert@emc.com)
https://www.oracle.com/security-alerts/cpuoct2021.html(security_alert@emc.com)
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html(security_alert@emc.com)
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html(security_alert@emc.com)
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/103771(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1041301(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1320(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2939(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe%40%3Cissues.activemq.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c%40%3Cissues.activemq.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369%40%3Cissues.activemq.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://pivotal.io/security/cve-2018-1275(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.