8.8
CWE
863
Advisory Published
Advisory Published
Updated

CVE-2018-1258

First published: Fri May 11 2018(Updated: )

Pivotal Spring Framework Spring Security could allow a remote attacker to bypass security restrictions. By sending a specially-crafted request, an attacker could exploit this vulnerability to gain unauthorized access to methods that should be restricted.

Credit: security_alert@emc.com security_alert@emc.com

Affected SoftwareAffected VersionHow to fix
redhat/spring-framework<5.0.6
5.0.6
maven/org.springframework:spring-core=5.0.5.RELEASE
5.0.6.RELEASE
IBM GDE<=3.0.0.2
All of
Pivotal Software Spring Security
Spring Framework=5.0.5
Oracle Agile PLM=9.3.3
Oracle Agile PLM=9.3.4
Oracle Agile PLM=9.3.5
Oracle Agile PLM=9.3.6
Oracle Application Testing Suite=10.1
Oracle Application Testing Suite=12.5.0.3
Oracle Application Testing Suite=13.1.0.1
Oracle Application Testing Suite=13.2.0.1
Oracle Application Testing Suite=13.3.0.1
Oracle Big Data Discovery=1.6.0
Oracle Communications Converged Application Server<7.0.0.1
Oracle Communications Diameter Signaling Router<8.3
Oracle Communications Network Integrity>=7.3.2<=7.3.6
Oracle Communications Performance Intelligence Center<10.2.1
Oracle Communications Services Gatekeeper<6.1.0.4.0
Oracle Endeca Information Discovery Integrator=3.1.0
Oracle Endeca Information Discovery Integrator=3.2.0
Oracle Enterprise Manager for MySQL=13.2
Oracle Enterprise Manager Ops Center=12.2.2
Oracle Enterprise Manager Ops Center=12.3.3
Oracle Enterprise Repository=11.1.1.7.0
Oracle Enterprise Repository=12.1.3.0.0
Oracle GoldenGate for Big Data=12.2.0.1
Oracle GoldenGate for Big Data=12.3.1.1
Oracle GoldenGate for Big Data=12.3.2.1
Oracle Health Sciences Information Manager=3.0
Oracle Healthcare Master Person Index=3.0
Oracle Healthcare Master Person Index=4.0
Oracle Hospitality Guest Access=4.2.0
Oracle Hospitality Guest Access=4.2.1
Oracle Insurance Calculation Engine=10.1.1
Oracle Insurance Calculation Engine=10.2
Oracle Insurance Calculation Engine=10.2.1
oracle insurance policy administration=10.0
oracle insurance policy administration=10.1
oracle insurance policy administration=10.2
oracle insurance policy administration=11.0
Oracle Insurance Rules Palette=10.0
Oracle Insurance Rules Palette=10.1
Oracle Insurance Rules Palette=10.2
Oracle Insurance Rules Palette=11.0
Oracle Insurance Rules Palette=11.1
oracle micros lucas=2.9.5
MySQL Enterprise Monitor<=8.0.2.8191
Oracle PeopleSoft Enterprise Financials Installation=9.2
Oracle Retail Assortment Planning=14.1
Oracle Retail Assortment Planning=15.0
Oracle Retail Assortment Planning=16.0
Oracle Retail Back Office=14.0
Oracle Retail Back Office=14.1
Oracle Retail Central Office=14.0
Oracle Retail Central Office=14.1
Oracle Retail Customer Insights=15.0
Oracle Retail Customer Insights=16.0
oracle retail financial integration=13.2
oracle retail financial integration=14.0
oracle retail financial integration=14.1
oracle retail financial integration=15.0
oracle retail financial integration=16.0
Oracle Retail Integration Bus=14.1.2
Oracle Retail Point-of-Sale=14.0
Oracle Retail Point-of-Sale=14.1
Oracle Retail Returns Management=14.0
Oracle Retail Returns Management=14.1
Oracle Retail Xstore Office Cloud Service=17.0
Oracle Service Architecture Leveraging Tuxedo=12.1.3.0.0
Oracle Service Architecture Leveraging Tuxedo=12.2.2.0.0
Oracle Tape Library ACSLS=8.4
Oracle WebLogic Server=10.3.6.0
Oracle WebLogic Server=12.1.3.0
Oracle WebLogic Server=12.2.1.2
Oracle WebLogic Server=12.2.1.3
NetApp OnCommand Insight
NetApp OnCommand Unified Manager for Windows>=7.3
NetApp OnCommand Unified Manager for vSphere>=9.4
NetApp OnCommand Workflow Automation
NetApp SnapCenter
NetApp Storage Automation Store
Red Hat Fuse=7.3.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2018-1258?

    CVE-2018-1258 has been classified with a critical severity due to its potential to allow unauthorized access.

  • How do I fix CVE-2018-1258?

    To fix CVE-2018-1258, upgrade Pivotal Spring Framework to version 5.0.6 or later.

  • What applications are affected by CVE-2018-1258?

    CVE-2018-1258 affects applications using Pivotal Spring Framework version 5.0.5 and related security components.

  • What type of vulnerability is CVE-2018-1258?

    CVE-2018-1258 is a security bypass vulnerability that allows attackers to gain unauthorized access to protected methods.

  • Who is impacted by CVE-2018-1258?

    Organizations using vulnerable versions of Pivotal Spring Framework are at risk and should take immediate action to address it.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203