In Spring Cloud Data Flow versions prior to 2.11.4, a malicious user who has access to the Skipper server api can use a crafted upload request to write an arbitrary file to any location on the file system which could lead to compromising the server
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-p528-3mvf-gr87 | Remote code execution in Spring Cloud Data Flow |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://spring.io/security/cve-2024-37084 |
|
History
Mon, 26 Aug 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vmware
Vmware spring Cloud Data Flow |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:vmware:spring_cloud_data_flow:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Vmware
Vmware spring Cloud Data Flow |
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2024-08-02T03:43:50.987Z
Reserved: 2024-06-03T05:40:17.632Z
Link: CVE-2024-37084
Updated: 2024-08-02T03:43:50.987Z
Status : Modified
Published: 2024-07-25T10:15:07.260
Modified: 2024-11-21T09:23:09.750
Link: CVE-2024-37084
No data.
OpenCVE Enrichment
No data.
Github GHSA