mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-30 18:04:30 +00:00
99 lines
3.4 KiB
JSON
99 lines
3.4 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "security_alert@emc.com",
|
|
"DATE_PUBLIC" : "2018-04-09T00:00:00",
|
|
"ID" : "CVE-2018-1275",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "Spring Framework",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "Versions prior to 5.0.5 and 4.3.16"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "Spring by Pivotal"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "CWE-94 - Code Injection"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "https://pivotal.io/security/cve-2018-1275",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://pivotal.io/security/cve-2018-1275"
|
|
},
|
|
{
|
|
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
|
|
},
|
|
{
|
|
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
|
|
},
|
|
{
|
|
"name" : "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2018:1320",
|
|
"refsource" : "REDHAT",
|
|
"url" : "https://access.redhat.com/errata/RHSA-2018:1320"
|
|
},
|
|
{
|
|
"name" : "RHSA-2018:2939",
|
|
"refsource" : "REDHAT",
|
|
"url" : "https://access.redhat.com/errata/RHSA-2018:2939"
|
|
},
|
|
{
|
|
"name" : "103771",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/103771"
|
|
},
|
|
{
|
|
"name" : "1041301",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://www.securitytracker.com/id/1041301"
|
|
}
|
|
]
|
|
}
|
|
}
|