You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used in combination with XMLBeam 1.4.14 or earlier versions, contains a property binder vulnerability caused by improper restriction of XML external entity references as underlying library XMLBeam does not restrict external reference expansion. An unauthenticated remote malicious user can supply specially crafted request parameters against Spring Data's projection-based request payload binding to access arbitrary files on the system.
Fix Resolution: Users of affected versions should apply the following mitigation:
1.13.x users should upgrade to 1.13.12 (Ingalls SR12)
2.0.x users should upgrade to 2.0.7 (Kay SR7)
Alternatively, upgrade to XMLBeam 1.4.15
Releases that have fixed this issue include:
Spring Data REST 2.6.12 (Ingalls SR12)
Spring Data REST 3.0.7 (Kay SR7)
There are no other mitigation steps necessary.
Note that the vulnerability is only exploitable when using XMLBeam. The use of authentication and authorization for endpoints, both of which are provided by Spring Security, limits exposure to this vulnerability to authorized users.
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered:
CVE-2018-1259 - High Severity Vulnerability
Vulnerable Library - spring-data-commons-1.13.1.RELEASE.jar
Global parent pom.xml to be used by Spring Data modules
path: /root/.gradle/caches/modules-2/files-2.1/org.springframework.data/spring-data-commons/1.13.1.RELEASE/4e4257f2eb3f191613b4b000d43e8d0c3ff4457e/spring-data-commons-1.13.1.RELEASE.jar
Library home page: http://www.spring.io/spring-data/spring-data-commons
Dependency Hierarchy:
Vulnerability Details
Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used in combination with XMLBeam 1.4.14 or earlier versions, contains a property binder vulnerability caused by improper restriction of XML external entity references as underlying library XMLBeam does not restrict external reference expansion. An unauthenticated remote malicious user can supply specially crafted request parameters against Spring Data's projection-based request payload binding to access arbitrary files on the system.
Publish Date: 2018-05-11
URL: CVE-2018-1259
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://pivotal.io/security/cve-2018-1259
Fix Resolution: Users of affected versions should apply the following mitigation: 1.13.x users should upgrade to 1.13.12 (Ingalls SR12) 2.0.x users should upgrade to 2.0.7 (Kay SR7) Alternatively, upgrade to XMLBeam 1.4.15 Releases that have fixed this issue include: Spring Data REST 2.6.12 (Ingalls SR12) Spring Data REST 3.0.7 (Kay SR7) There are no other mitigation steps necessary. Note that the vulnerability is only exploitable when using XMLBeam. The use of authentication and authorization for endpoints, both of which are provided by Spring Security, limits exposure to this vulnerability to authorized users.
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: