Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Oracle
Subscribe
|
Application Testing Suite
Subscribe
Big Data Discovery
Subscribe
Communications Converged Application Server
Subscribe
Communications Diameter Signaling Router
Subscribe
Communications Performance Intelligence Center
Subscribe
Communications Services Gatekeeper
Subscribe
Goldengate For Big Data
Subscribe
Health Sciences Information Manager
Subscribe
Healthcare Master Person Index
Subscribe
Insurance Calculation Engine
Subscribe
Insurance Rules Palette
Subscribe
Primavera Gateway
Subscribe
Retail Customer Insights
Subscribe
Retail Open Commerce Platform
Subscribe
Retail Order Broker
Subscribe
Retail Predictive Application Server
Subscribe
Service Architecture Leveraging Tuxedo
Subscribe
Tape Library Acsls
Subscribe
|
|
Redhat
Subscribe
|
|
|
Vmware
Subscribe
|
Spring Framework
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3rmv-2pg5-xvqj | Spring Framework has Improperly Implemented Security Check for Standard |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-09-17T02:43:01.710Z
Reserved: 2017-12-06T00:00:00
Link: CVE-2018-1275
No data.
Status : Modified
Published: 2018-04-11T13:29:00.353
Modified: 2024-11-21T03:59:31.333
Link: CVE-2018-1275
OpenCVE Enrichment
No data.
Github GHSA