VMware SpringSource Grails before 1.3.8, and 2.x before 2.0.2, does not properly restrict data binding, which might allow remote attackers to bypass intended access restrictions and modify arbitrary object properties via a crafted request parameter to an application.
References
Link | Resource |
---|---|
http://secunia.com/advisories/51113 | |
http://support.springsource.com/security/cve-2012-1833 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/55763 | |
http://secunia.com/advisories/51113 | |
http://support.springsource.com/security/cve-2012-1833 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/55763 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/51113 - | |
References | () http://support.springsource.com/security/cve-2012-1833 - Exploit, Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/55763 - |
Information
Published : 2012-09-28 21:55
Updated : 2024-11-21 01:37
NVD link : CVE-2012-1833
Mitre link : CVE-2012-1833
CVE.ORG link : CVE-2012-1833
JSON object : View
Products Affected
springsource
- grails
CWE
CWE-264
Permissions, Privileges, and Access Controls