CVE-2018-1274
Severity
7.5HIGH
EPSS
1.0%
top 23.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 18
Latest updateOct 17
Description
Spring Data Commons, versions 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property path parser vulnerability caused by unlimited resource allocation. An unauthenticated remote malicious user (or attacker) can issue requests against Spring Data REST endpoints or endpoints using property path parsing which can cause a denial of service (CPU and memory consumption).
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages4 packages
🔴Vulnerability Details
3📋Vendor Advisories
1Red Hat▶
spring-data-commons: Unlimited path depth in PropertyPath.java allow remote attackers to cause a denial of service↗2018-04-04
💬Community
2Bugzilla▶
CVE-2018-1274 spring-data-commons: Unlimited path depth in PropertyPath.java allow remote attackers to cause a denial of service↗2018-04-11
Bugzilla▶
CVE-2018-1274 springframework-data-commons: spring-data-commons: Unlimited path depth in PropertyPath.java allow remote attackers to cause a denial of service [fedora-all]↗2018-04-11