7.5
CWE
829
Advisory Published
Advisory Published
Updated

CVE-2018-11040

First published: Thu Jun 14 2018(Updated: )

Pivotal Spring Framework could allow a remote attacker to bypass security restrictions, caused by a flaw in AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView. By sending a specially-crafted request, an attacker could exploit this vulnerability to perform cross-domain requests.

Credit: security_alert@emc.com security_alert@emc.com

Affected SoftwareAffected VersionHow to fix
IBM GDE<=3.0.0.2
VMware Spring Framework<4.3.18
VMware Spring Framework>=5.0.0<5.0.7
Oracle Agile Product Lifecycle Management=9.3.3
Oracle Agile Product Lifecycle Management=9.3.4
Oracle Agile Product Lifecycle Management=9.3.5
Oracle Application Testing Suite=12.5.0.3
Oracle Application Testing Suite=13.1.0.1
Oracle Application Testing Suite=13.2.0.1
Oracle Application Testing Suite=13.3.0.1
Oracle Communications Network Integrity>=7.3.2<=7.3.6
Oracle Communications Online Mediation Controller=6.1
Oracle Communications Services Gatekeeper<6.1.0.4.0
Oracle Communications Unified Inventory Management=7.3.2
Oracle Communications Unified Inventory Management=7.3.4
Oracle Communications Unified Inventory Management=7.3.5
Oracle Communications Unified Inventory Management=7.4.0
Oracle Endeca Information Discovery Integrator=3.1.0
Oracle Endeca Information Discovery Integrator=3.2.0
Oracle Enterprise Manager Mysql=13.2
Oracle Enterprise Manager Ops Center=12.3.3
Oracle FLEXCUBE Private Banking=2.0.0.0
Oracle FLEXCUBE Private Banking=2.2.0.1
Oracle FLEXCUBE Private Banking=12.0.1.0
Oracle FLEXCUBE Private Banking=12.0.3.0
Oracle FLEXCUBE Private Banking=12.1.0.0
Oracle Healthcare Master Person Index=3.0
Oracle Healthcare Master Person Index=4.0
Oracle Hospitality Guest Access=4.2.0
Oracle Hospitality Guest Access=4.2.1
Oracle Insurance Calculation Engine>=11.0.0<=11.3.1
Oracle Insurance Rules Palette=10.0
Oracle Insurance Rules Palette=10.2
Oracle Micros Lucas=2.9.5
Oracle Mysql Enterprise Monitor<=3.4.9.4237
Oracle Mysql Enterprise Monitor>=3.4.10<=4.0.6.5281
Oracle Mysql Enterprise Monitor>=4.0.7<=8.0.2.8191
Oracle Product Lifecycle Management=9.3.6
Oracle Retail Advanced Inventory Planning=15.0
Oracle Retail Clearance Optimization Engine=14.0.5
Oracle Retail Customer Insights=15.0
Oracle Retail Customer Insights=16.0
Oracle Retail Markdown Optimization=13.4.4
Oracle Retail Predictive Application Server=14.0.3.26
Oracle Retail Predictive Application Server=14.1.3.37
Oracle Retail Predictive Application Server=15.0.3.100
Oracle Retail Predictive Application Server=16.0
Oracle Retail Service Backbone=16.0.1
Oracle Retail Xstore Point of Service=7.1
Oracle Utilities Network Management System=1.12.0.3
Oracle WebLogic Server=12.2.1.3.0
Debian Debian Linux=9.0
maven/org.springframework:spring-core>=4.3.0.RELEASE<4.3.18.RELEASE
4.3.18.RELEASE
maven/org.springframework:spring-core>=5.0.0.RELEASE<5.0.7.RELEASE
5.0.7.RELEASE

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2018-11040?

    CVE-2018-11040 is a vulnerability in the Pivotal Spring Framework that allows a remote attacker to bypass security restrictions.

  • Which versions of Spring Framework are affected by CVE-2018-11040?

    Spring Framework versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18, as well as older unsupported versions, are affected.

  • How can a remote attacker exploit CVE-2018-11040?

    A remote attacker can exploit CVE-2018-11040 by enabling cross-domain requests via JSONP through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests.

  • What is the severity of CVE-2018-11040?

    CVE-2018-11040 has a severity value of 7.5 (high).

  • Where can I find more information about CVE-2018-11040?

    You can find more information about CVE-2018-11040 in the Oracle Security Advisory and Debian LTS Announcement.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203