First published: Wed Apr 11 2018(Updated: )
Spring Data Commons contains a property binder vulnerability which can allow an attacker to perform remote code execution.
Credit: security_alert@emc.com security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Software Spring Data Commons | <=1.12.10 | |
Pivotal Software Spring Data Commons | >=1.13<=1.13.10 | |
Pivotal Software Spring Data Commons | >=2.0<=2.0.5 | |
Pivotal Software Spring Data Rest | <=2.5.10 | |
Pivotal Software Spring Data Rest | >=2.6<=2.6.10 | |
Pivotal Software Spring Data Rest | >=3.0<=3.0.5 | |
Apache Ignite | >=1.0.0<=2.5.0 | |
Apache Ignite | =1.0.0-rc3 | |
VMware Tanzu Spring Data Commons | ||
maven/org.springframework.data:spring-data-commons | >=2.0.0<2.0.6 | 2.0.6 |
maven/org.springframework.data:spring-data-commons | >=1.13.0<1.13.11 | 1.13.11 |
Pivotal Software Spring Data Commons | >=1.13.0<=1.13.10 | |
Pivotal Software Spring Data Commons | >=2.0.0<=2.0.5 | |
Pivotal Software Spring Data Rest | >=2.6.0<=2.6.10 | |
Pivotal Software Spring Data Rest | >=3.0.0<=3.0.5 | |
Apache Ignite | >=1.0.1<=2.5.0 | |
Apache Ignite | =1.0.0 | |
Oracle Financial Services Crime And Compliance Management Studio | =8.0.8.2.0 | |
Oracle Financial Services Crime And Compliance Management Studio | =8.0.8.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1273 is a vulnerability in VMware Tanzu Spring Data Commons that allows an unauthenticated remote attacker to supply specially crafted request parameters.
Users of VMware Tanzu Spring Data Commons versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions are affected.
CVE-2018-1273 has a severity rating of 9.8 (Critical).
An attacker can exploit CVE-2018-1273 by supplying specially crafted request parameters.
You can find more information about CVE-2018-1273 at the following references: [Reference 1](http://mail-archives.apache.org/mod_mbox/ignite-dev/201807.mbox/%3CCAK0qHnqzfzmCDFFi6c5Jok19zNkVCz5Xb4sU%3D0f2J_1i4p46zQ%40mail.gmail.com%3E), [Reference 2](https://pivotal.io/security/cve-2018-1273), [Reference 3](https://www.oracle.com/security-alerts/cpujul2022.html).