Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used in combination with XMLBeam 1.4.14 or earlier versions, contains a property binder vulnerability caused by improper restriction of XML external entity references as underlying library XMLBeam does not restrict external reference expansion. An unauthenticated remote malicious user can supply specially crafted request parameters against Spring Data's projection-based request payload binding to access arbitrary files on the system.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2018:1809 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:3768 | Third Party Advisory |
https://pivotal.io/security/cve-2018-1259 | Vendor Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
25 Jul 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2018-05-11 20:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-1259
Mitre link : CVE-2018-1259
CVE.ORG link : CVE-2018-1259
JSON object : View
Products Affected
xmlbeam
- xmlbeam
pivotal_software
- spring_data_commons
- spring_data_rest
CWE
CWE-611
Improper Restriction of XML External Entity Reference