Description
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.
Published: 2018-04-11
Score: 9.8 Critical
EPSS: 38.1% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3rmv-2pg5-xvqj Spring Framework has Improperly Implemented Security Check for Standard
History

No history.

Subscriptions

Oracle Application Testing Suite Big Data Discovery Communications Converged Application Server Communications Diameter Signaling Router Communications Performance Intelligence Center Communications Services Gatekeeper Goldengate For Big Data Health Sciences Information Manager Healthcare Master Person Index Insurance Calculation Engine Insurance Rules Palette Primavera Gateway Retail Customer Insights Retail Open Commerce Platform Retail Order Broker Retail Predictive Application Server Service Architecture Leveraging Tuxedo Tape Library Acsls
Redhat Jboss Fuse Openshift Application Runtimes
Vmware Spring Framework
cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2024-09-17T02:43:01.710Z

Reserved: 2017-12-06T00:00:00.000Z

Link: CVE-2018-1275

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-04-11T13:29:00.353

Modified: 2024-11-21T03:59:31.333

Link: CVE-2018-1275

cve-icon Redhat

Severity : Critical

Publid Date: 2018-04-09T19:00:00Z

Links: CVE-2018-1275 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses