{ "CVE_data_meta" : { "ASSIGNER" : "security_alert@emc.com", "DATE_PUBLIC" : "2018-04-05T00:00:00", "ID" : "CVE-2018-1270", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "Spring Framework", "version" : { "version_data" : [ { "version_value" : "Versions prior to 5.0.5 and 4.3.15" } ] } } ] }, "vendor_name" : "Spring by Pivotal" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "CWE-94 - Code Injection" } ] } ] }, "references" : { "reference_data" : [ { "name" : "44796", "refsource" : "EXPLOIT-DB", "url" : "https://www.exploit-db.com/exploits/44796/" }, { "name" : "https://pivotal.io/security/cve-2018-1270", "refsource" : "CONFIRM", "url" : "https://pivotal.io/security/cve-2018-1270" }, { "name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource" : "CONFIRM", "url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource" : "CONFIRM", "url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name" : "RHSA-2018:2939", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2018:2939" }, { "name" : "103696", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/103696" } ] } }