Description
Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.
Published: 2018-01-04
Score: 9.8 Critical
EPSS: 94.0% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-9qf9-28h9-hqcj Remote code execution in PATCH requests in Spring Data REST
History

No history.

Subscriptions

Pivotal Software Spring Data Rest
Redhat Jboss Fuse
Vmware Spring Boot
cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2024-08-05T16:19:29.628Z

Reserved: 2017-04-21T00:00:00.000Z

Link: CVE-2017-8046

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-01-04T06:29:00.307

Modified: 2024-11-21T03:33:12.757

Link: CVE-2017-8046

cve-icon Redhat

Severity : Critical

Publid Date: 2018-03-06T00:00:00Z

Links: CVE-2017-8046 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses