Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2018-1272 @ Maven-org.springframework:spring-core-3.2.4.RELEASE #26

Open
helderfvieira opened this issue Jan 31, 2024 · 0 comments
Open

Comments

@helderfvieira
Copy link
Owner

helderfvieira commented Jan 31, 2024

Checkmarx (SCA): Vulnerable Package
Vulnerability: Read More about CVE-2018-1272
Checkmarx Project: helderfvieira/astlab
Repository URL: https://github.com/helderfvieira/astlab
Branch: main
Scan ID: 20b71e31-5622-45a6-bb91-99f4b25775aa


Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.


Additional Info
Attack vector: NETWORK
Attack complexity: HIGH
Confidentiality impact: HIGH
Availability impact: HIGH
Remediation Upgrade Recommendation: 4.0.0.M3

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant