First published: Tue Apr 10 2018(Updated: )
Spring Data Commons, versions 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property path parser vulnerability caused by unlimited resource allocation. An unauthenticated remote malicious user (or attacker) can issue requests against Spring Data REST endpoints or endpoints using property path parsing which can cause a denial of service (CPU and memory consumption).
Credit: security_alert@emc.com security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Software Spring Data Commons | >=1.13<=1.13.10 | |
Pivotal Software Spring Data Commons | >=2.0<=2.0.5 | |
Pivotal Software Spring Data Rest | >=2.6<=2.6.10 | |
Pivotal Software Spring Data Rest | >=3.0<=3.0.5 | |
maven/org.springframework.data:spring-data-commons | >=2.0.0<2.0.6 | 2.0.6 |
maven/org.springframework.data:spring-data-commons | <1.13.11 | 1.13.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1274 is a property path parser vulnerability in Spring Data Commons versions 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, allowing for unlimited resource allocation and potential remote code execution.
CVE-2018-1274 has a severity rating of 7.5 (High).
CVE-2018-1274 allows an unauthenticated remote attacker to issue requests against Spring Data REST endpoints, potentially leading to remote code execution.
To fix CVE-2018-1274, it is recommended to update to a supported version of Spring Data Commons (1.13.11 or newer, 2.0.6 or newer) or Spring Data REST (2.6.11 or newer, 3.0.6 or newer).
More information about CVE-2018-1274 can be found at the following references: [securityfocus.com](http://www.securityfocus.com/bid/103769), [pivotal.io](https://pivotal.io/security/cve-2018-1274), [oracle.com](https://www.oracle.com/security-alerts/cpujul2022.html).