PT-2018-3847 · Spring · Spring Data Commons
Published
2018-03-27
·
Updated
2025-10-28
·
CVE-2018-1273
CVSS v3.1
10
Critical
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Spring Data Commons versions prior to 1.13.10
Spring Data Commons versions 2.0 to 2.0.5
Spring Data Commons older unsupported versions
Description
The issue is caused by improper neutralization of special elements, leading to a property binder vulnerability. An unauthenticated remote malicious user can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding, which can lead to a remote code execution attack. The vulnerability is related to insufficient input validation in the SimpleEvaluationContext class of the Spring Data Commons platform and the Spring Data REST framework.
Recommendations
For Spring Data Commons versions prior to 1.13.10, update to version 1.13.10 or later.
For Spring Data Commons versions 2.0 to 2.0.5, update to version 2.0.6 or later.
For Spring Data Commons older unsupported versions, consider upgrading to a supported version and then applying the necessary updates.
As a temporary workaround, consider restricting access to Spring Data REST backed HTTP resources and limiting the use of projection-based request payload binding until a patch is available.
Exploit
Fix
RCE
Code Injection
Special Elements Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Spring Data Commons