Vulnerability CVE-2018-1270


Published: 2018-04-06

Description:
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Pivotal Spring Java Framework < 5.0 Remote Code Execution
JameelNabbo
30.05.2018

Type:

CWE-358

(Improperly Implemented Security Check for Standard)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Pivotal software -> Spring framework 
Oracle -> Retail open commerce platform 
Oracle -> Retail order broker 
Oracle -> Application testing suite 
Oracle -> Retail point-of-sale 
Oracle -> Big data discovery 
Oracle -> Retail predictive application server 
Oracle -> Communications diameter signaling router 
Oracle -> Retail returns management 
Oracle -> Enterprise manager ops center 
Oracle -> Service architecture leveraging tuxedo 
Oracle -> Goldengate for big data 
Oracle -> Tape library acsls 
Oracle -> Health sciences information manager 
Oracle -> Healthcare master person index 
Oracle -> Insurance calculation engine 
Oracle -> Insurance rules palette 
Oracle -> Primavera gateway 
Oracle -> Retail back office 
Oracle -> Retail central office 
Oracle -> Retail customer insights 
Oracle -> Retail integration bus 

 References:
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103696
https://access.redhat.com/errata/RHSA-2018:2939
https://lists.apache.org/thread.html/4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe@%3Cissues.activemq.apache.org%3E
https://pivotal.io/security/cve-2018-1270
https://www.exploit-db.com/exploits/44796/
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Copyright 2024, cxsecurity.com

 

Back to Top