mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 18:52:12 +00:00
24 lines
1.2 KiB
Markdown
24 lines
1.2 KiB
Markdown
![]() |
### [CVE-2018-1259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1259)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used in combination with XMLBeam 1.4.14 or earlier versions, contains a property binder vulnerability caused by improper restriction of XML external entity references as underlying library XMLBeam does not restrict external reference expansion. An unauthenticated remote malicious user can supply specially crafted request parameters against Spring Data's projection-based request payload binding to access arbitrary files on the system.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/ax1sX/SpringSecurity
|
||
|
- https://github.com/developer3000S/PoC-in-GitHub
|
||
|
- https://github.com/hectorgie/PoC-in-GitHub
|
||
|
- https://github.com/superfish9/pt
|
||
|
- https://github.com/tafamace/CVE-2018-1259
|
||
|
|