CRITICAL · 9.8

CVE-2018-1273

Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An ...

Vulnerability Description

Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
Pivotal SoftwareSpring Data Commons<= 1.12.10
Pivotal SoftwareSpring Data Rest<= 2.5.10
ApacheIgnite>= 1.0.1, <= 2.5.0
OracleFinancial Services Crime And Compliance Management Studio8.0.8.2.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2018-1273?

CVE-2018-1273 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An ...

How severe is CVE-2018-1273?

CVE-2018-1273 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2018-1273?

Check the references section above for vendor advisories and patch information. Affected products include: Pivotal Software Spring Data Commons, Pivotal Software Spring Data Rest, Apache Ignite, Oracle Financial Services Crime And Compliance Management Studio.