First published: Thu Jul 25 2024(Updated: )
In Spring Cloud Data Flow versions prior to 2.11.4, a malicious user who has access to the Skipper server api can use a crafted upload request to write an arbitrary file to any location on the file system which could lead to compromising the server
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.springframework.cloud:spring-cloud-skipper | <2.11.4 | 2.11.4 |
Vmware Spring Cloud Data Flow | >=2.11.0<2.11.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37084 is considered a critical vulnerability due to its potential to allow arbitrary file write access on the server.
To fix CVE-2024-37084, upgrade Spring Cloud Data Flow to version 2.11.4 or later.
CVE-2024-37084 affects users of Spring Cloud Data Flow versions prior to 2.11.4.
The impact of CVE-2024-37084 is that it could allow an attacker to compromise the server by writing malicious files.
CVE-2024-37084 specifically affects the Skipper server API component of Spring Cloud Data Flow.