Description
In Spring Cloud Data Flow versions prior to 2.11.4, a malicious user who has access to the Skipper server api can use a crafted upload request to write an arbitrary file to any location on the file system which could lead to compromising the server
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-p528-3mvf-gr87 | Remote code execution in Spring Cloud Data Flow |
References
| Link | Providers |
|---|---|
| https://spring.io/security/cve-2024-37084 |
|
History
Mon, 26 Aug 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vmware
Vmware spring Cloud Data Flow |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:vmware:spring_cloud_data_flow:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Vmware
Vmware spring Cloud Data Flow |
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2024-08-02T03:43:50.987Z
Reserved: 2024-06-03T05:40:17.632Z
Link: CVE-2024-37084
Updated: 2024-08-02T03:43:50.987Z
Status : Modified
Published: 2024-07-25T10:15:07.260
Modified: 2024-11-21T09:23:09.750
Link: CVE-2024-37084
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA