ID

VAR-201804-1674


CVE

CVE-2018-1272


TITLE

Spring Framework Vulnerabilities related to authorization, permissions, and access control

Trust: 0.8

sources: JVNDB: JVNDB-2018-003099

DESCRIPTION

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles. Spring Framework Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Pivotal Spring Framework is prone to a remote privilege-escalation vulnerability. An attacker can exploit this issue to gain elevated privileges. Failed exploit attempts will likely result in denial-of-service conditions. Pivotal Software Spring Framework is a set of open source Java and JavaEE application frameworks from Pivotal Software in the United States. The framework helps developers build high-quality applications. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: Fuse 7.1 security update Advisory ID: RHSA-2018:2669-01 Product: Red Hat JBoss Fuse Advisory URL: https://access.redhat.com/errata/RHSA-2018:2669 Issue date: 2018-09-11 Cross references: RHBA-2018:2665-04 CVE Names: CVE-2014-0114 CVE-2016-5397 CVE-2016-1000338 CVE-2016-1000339 CVE-2016-1000340 CVE-2016-1000341 CVE-2016-1000342 CVE-2016-1000343 CVE-2016-1000344 CVE-2016-1000345 CVE-2016-1000346 CVE-2016-1000352 CVE-2017-14063 CVE-2018-1114 CVE-2018-1271 CVE-2018-1272 CVE-2018-1338 CVE-2018-1339 CVE-2018-8036 CVE-2018-8088 CVE-2018-1000129 CVE-2018-1000130 CVE-2018-1000180 ==================================================================== 1. Summary: An update is now available for Red Hat Fuse. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform. This release of Red Hat Fuse 7.1 serves as a replacement for Red Hat Fuse 7.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es): * Apache Struts 1: Class Loader manipulation via request parameters (CVE-2014-0114) * thrift: Improper file path sanitization in t_go_generator.cc:format_go_output() of the go client library can allow an attacker to inject commands (CVE-2016-5397) * slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution (CVE-2018-8088) * jolokia: JMX proxy mode vulnerable to remote code execution (CVE-2018-1000130) * bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data (CVE-2016-1000338) * bouncycastle: Information leak in AESFastEngine class (CVE-2016-1000339) * bouncycastle: Information exposure in DSA signature generation via timing attack (CVE-2016-1000341) * bouncycastle: ECDSA improper validation of ASN.1 encoding of signature (CVE-2016-1000342) * bouncycastle: DHIES implementation allowed the use of ECB mode (CVE-2016-1000344) * bouncycastle: DHIES/ECIES CBC modes are vulnerable to padding oracle attack (CVE-2016-1000345) * bouncycastle: Other party DH public keys are not fully validated (CVE-2016-1000346) * bouncycastle: ECIES implementation allowed the use of ECB mode (CVE-2016-1000352) * async-http-client: Invalid URL parsing with '?' (CVE-2017-14063) * undertow: File descriptor leak caused by JarURLConnection.getLastModified() allows attacker to cause a denial of service (CVE-2018-1114) * spring-framework: Directory traversal vulnerability with static resources on Windows filesystems (CVE-2018-1271) * tika: Infinite loop in BPGParser can allow remote attacker to cause a denial of service (CVE-2018-1338) * tika: Infinite loop in ChmParser can allow remote attacker to cause a denial of service (CVE-2018-1339) * pdfbox: Infinite loop in AFMParser.java allows for out of memory erros via crafted PDF (CVE-2018-8036) * jolokia: Cross site scripting in the HTTP servlet (CVE-2018-1000129) * bouncycastle: flaw in the low-level interface to RSA key pair generator (CVE-2018-1000180) * bouncycastle: Carry propagation bug in math.raw.Nat??? class (CVE-2016-1000340) * bouncycastle: DSA key pair generator generates a weak private key by default (CVE-2016-1000343) * spring-framework: Multipart content pollution (CVE-2018-1272) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Chris McCown for reporting CVE-2018-8088. 3. Solution: Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. Installation instructions are located in the download section of the customer portal. The References section of this erratum contains a download link (you must log in to download the update). 4. Bugs fixed (https://bugzilla.redhat.com/): 1091938 - CVE-2014-0114 Apache Struts 1: Class Loader manipulation via request parameters 1487563 - CVE-2017-14063 async-http-client: Invalid URL parsing with '?' 1544620 - CVE-2016-5397 thrift: Improper file path sanitization in t_go_generator.cc:format_go_output() of the go client library can allow an attacker to inject commands 1548909 - CVE-2018-8088 slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution 1559316 - CVE-2018-1000130 jolokia: JMX proxy mode vulnerable to remote code execution 1559317 - CVE-2018-1000129 jolokia: Cross site scripting in the HTTP servlet 1564408 - CVE-2018-1272 spring-framework: Multipart content pollution 1571050 - CVE-2018-1271 spring-framework: Directory traversal vulnerability with static resources on Windows filesystems 1572421 - CVE-2018-1338 tika: Infinite loop in BPGParser can allow remote attacker to cause a denial of service 1572424 - CVE-2018-1339 tika: Infinite loop in ChmParser can allow remote attacker to cause a denial of service 1573045 - CVE-2018-1114 undertow: File descriptor leak caused by JarURLConnection.getLastModified() allows attacker to cause a denial of service 1588306 - CVE-2018-1000180 bouncycastle: flaw in the low-level interface to RSA key pair generator 1588313 - CVE-2016-1000338 bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data 1588314 - CVE-2016-1000344 bouncycastle: DHIES implementation allowed the use of ECB mode 1588323 - CVE-2016-1000345 bouncycastle: DHIES/ECIES CBC modes are vulnerable to padding oracle attack 1588327 - CVE-2016-1000346 bouncycastle: Other party DH public keys are not fully validated 1588330 - CVE-2016-1000352 bouncycastle: ECIES implementation allowed the use of ECB mode 1588688 - CVE-2016-1000340 bouncycastle: Carry propagation bug in math.raw.Nat??? class 1588695 - CVE-2016-1000339 bouncycastle: Information leak in AESFastEngine class 1588708 - CVE-2016-1000341 bouncycastle: Information exposure in DSA signature generation via timing attack 1588715 - CVE-2016-1000342 bouncycastle: ECDSA improper validation of ASN.1 encoding of signature 1588721 - CVE-2016-1000343 bouncycastle: DSA key pair generator generates a weak private key by default 1597490 - CVE-2018-8036 pdfbox: Infinite loop in AFMParser.java allows for out of memory erros via crafted PDF 5. References: https://access.redhat.com/security/cve/CVE-2014-0114 https://access.redhat.com/security/cve/CVE-2016-5397 https://access.redhat.com/security/cve/CVE-2016-1000338 https://access.redhat.com/security/cve/CVE-2016-1000339 https://access.redhat.com/security/cve/CVE-2016-1000340 https://access.redhat.com/security/cve/CVE-2016-1000341 https://access.redhat.com/security/cve/CVE-2016-1000342 https://access.redhat.com/security/cve/CVE-2016-1000343 https://access.redhat.com/security/cve/CVE-2016-1000344 https://access.redhat.com/security/cve/CVE-2016-1000345 https://access.redhat.com/security/cve/CVE-2016-1000346 https://access.redhat.com/security/cve/CVE-2016-1000352 https://access.redhat.com/security/cve/CVE-2017-14063 https://access.redhat.com/security/cve/CVE-2018-1114 https://access.redhat.com/security/cve/CVE-2018-1271 https://access.redhat.com/security/cve/CVE-2018-1272 https://access.redhat.com/security/cve/CVE-2018-1338 https://access.redhat.com/security/cve/CVE-2018-1339 https://access.redhat.com/security/cve/CVE-2018-8036 https://access.redhat.com/security/cve/CVE-2018-8088 https://access.redhat.com/security/cve/CVE-2018-1000129 https://access.redhat.com/security/cve/CVE-2018-1000130 https://access.redhat.com/security/cve/CVE-2018-1000180 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse&downloadType=distributions&version=7.1.0 https://access.redhat.com/documentation/en-us/red_hat_fuse/7.1/ https://access.redhat.com/articles/2939351 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBW5d0pdzjgjWX9erEAQg6Yw//dFPzbxBQz8m4jwPwRjNmTDM/tTOnxZSt MTqjRp8zX80qhQVMlVj7d9TQLX25bR9Vx4//Kktu3EIsON+ddxy+LZQBlX7l4XMy SP8FGfSp+GV6jiS+aOoRw+NaE8omM8AwYi0Clv562FIcM8qiqGt+O/QK0peN5JYA COa/6uSPsNftk7Sq3aQ0jWV35L92r2S1FeIg6FGanyqLO1Y+sKePY5T5HRSNpp06 lh00QeAdYlcGrIBbsQnds4uHW5PPrS7HoafCEuIPdCDoCjZTms3i9K3f57ZQ6ojn mpKaQgiWVPGenzAIh+JzFaMWTdMwVt6nDPuSt9SC6uDC20c+ffBjjsC2w0Bh/bVr yxas3NTobxggV8lN0PF0MHx776QtRyc+XukUZ+7FPm6irhfqMVBkUrD95s/qjNNF KNm8Nsz+HFqwaP0XCkfiBTPZs5yWf83KA/Qw9MOoJGVLXF28wzrELxPl8eMizCtX MCfop2FzGCCMkanRHMzZ+RkFQ9+wN+WHw1UXiANEaM+55yGfIWhqYOH2zQZzByNY YdKlSrAw2jvODvawFclMYG+zD97pr1VMvLb8W8uUiqRwKnsu303EtTk+IyTCcoS9 KDczeRZr/X98Ww0gXOEnUcVsTby6fhbtIgUbPt/3obsV6joyaHf5/mHj49uPluva TLag+xVs1p4=vq4F -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . For further information, refer to the Release Notes linked to in the References section. Security Fix(es): * spring-framework: Address partial fix for CVE-2018-1270 (CVE-2018-1275) * spring-framework: Directory traversal vulnerability with static resources on Windows filesystems (CVE-2018-1271) * tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources (CVE-2018-1304) * tomcat: Late application of security constraints can lead to resource exposure for unauthorised users (CVE-2018-1305) * spring-framework: Multipart content pollution (CVE-2018-1272) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 1548282 - CVE-2018-1305 tomcat: Late application of security constraints can lead to resource exposure for unauthorised users 1548289 - CVE-2018-1304 tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources 1564408 - CVE-2018-1272 spring-framework: Multipart content pollution 1565307 - CVE-2018-1275 spring-framework: Address partial fix for CVE-2018-1270 1571050 - CVE-2018-1271 spring-framework: Directory traversal vulnerability with static resources on Windows filesystems 5

Trust: 2.25

sources: NVD: CVE-2018-1272 // JVNDB: JVNDB-2018-003099 // BID: 103697 // VULHUB: VHN-122707 // VULMON: CVE-2018-1272 // PACKETSTORM: 149311 // PACKETSTORM: 147489

AFFECTED PRODUCTS

vendor:oraclemodel:retail point-of-salescope:eqversion:14.0

Trust: 1.0

vendor:oraclemodel:goldengate for big datascope:eqversion:12.2.0.1

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:eqversion:16.2

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:14.0.4

Trust: 1.0

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.2.2

Trust: 1.0

vendor:oraclemodel:insurance calculation enginescope:eqversion:10.2

Trust: 1.0

vendor:vmwaremodel:spring frameworkscope:ltversion:4.3.15

Trust: 1.0

vendor:oraclemodel:retail central officescope:eqversion:14.0

Trust: 1.0

vendor:oraclemodel:big data discoveryscope:eqversion:1.6.0

Trust: 1.0

vendor:oraclemodel:retail returns managementscope:eqversion:14.1

Trust: 1.0

vendor:oraclemodel:retail open commerce platformscope:eqversion:6.0.0

Trust: 1.0

vendor:oraclemodel:goldengate for big datascope:eqversion:12.3.1.1

Trust: 1.0

vendor:oraclemodel:retail order brokerscope:eqversion:5.2

Trust: 1.0

vendor:oraclemodel:application testing suitescope:eqversion:13.1.0.1

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:16.0.2

Trust: 1.0

vendor:oraclemodel:retail back officescope:eqversion:14.0

Trust: 1.0

vendor:oraclemodel:retail open commerce platformscope:eqversion:5.3.0

Trust: 1.0

vendor:oraclemodel:retail predictive application serverscope:eqversion:14.1

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:14.0.1

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:16.0

Trust: 1.0

vendor:oraclemodel:retail order brokerscope:eqversion:15.0

Trust: 1.0

vendor:vmwaremodel:spring frameworkscope:gteversion:4.3.0

Trust: 1.0

vendor:oraclemodel:retail predictive application serverscope:eqversion:16.0

Trust: 1.0

vendor:oraclemodel:tape library acslsscope:eqversion:8.4

Trust: 1.0

vendor:oraclemodel:retail order brokerscope:eqversion:5.1

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:16.0.1

Trust: 1.0

vendor:oraclemodel:communications performance intelligence centerscope:ltversion:10.2.1

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:eqversion:17.12

Trust: 1.0

vendor:vmwaremodel:spring frameworkscope:ltversion:5.0.5

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:14.1.2

Trust: 1.0

vendor:oraclemodel:communications diameter signaling routerscope:ltversion:8.3

Trust: 1.0

vendor:oraclemodel:service architecture leveraging tuxedoscope:eqversion:12.2.2.0.0

Trust: 1.0

vendor:oraclemodel:insurance rules palettescope:eqversion:11.1

Trust: 1.0

vendor:oraclemodel:application testing suitescope:eqversion:13.2.0.1

Trust: 1.0

vendor:oraclemodel:retail point-of-salescope:eqversion:14.1

Trust: 1.0

vendor:oraclemodel:insurance calculation enginescope:eqversion:10.2.1

Trust: 1.0

vendor:oraclemodel:service architecture leveraging tuxedoscope:eqversion:12.1.3.0.0

Trust: 1.0

vendor:oraclemodel:healthcare master person indexscope:eqversion:3.0

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:14.0.2

Trust: 1.0

vendor:oraclemodel:retail central officescope:eqversion:14.1

Trust: 1.0

vendor:oraclemodel:retail customer insightsscope:eqversion:15.0

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:14.0.3

Trust: 1.0

vendor:vmwaremodel:spring frameworkscope:gteversion:5.0

Trust: 1.0

vendor:oraclemodel:goldengate for big datascope:eqversion:12.3.2.1

Trust: 1.0

vendor:oraclemodel:retail returns managementscope:eqversion:14.0

Trust: 1.0

vendor:oraclemodel:insurance calculation enginescope:eqversion:10.1.1

Trust: 1.0

vendor:oraclemodel:insurance rules palettescope:eqversion:10.1

Trust: 1.0

vendor:oraclemodel:application testing suitescope:eqversion:13.3.0.1

Trust: 1.0

vendor:oraclemodel:retail order brokerscope:eqversion:16.0

Trust: 1.0

vendor:oraclemodel:communications services gatekeeperscope:ltversion:6.1.0.4.0

Trust: 1.0

vendor:oraclemodel:insurance rules palettescope:eqversion:11.0

Trust: 1.0

vendor:oraclemodel:retail back officescope:eqversion:14.1

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:14.1.1

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:15.0.2

Trust: 1.0

vendor:oraclemodel:communications converged application serverscope:ltversion:7.0.0.1

Trust: 1.0

vendor:oraclemodel:retail predictive application serverscope:eqversion:14.0

Trust: 1.0

vendor:oraclemodel:insurance rules palettescope:eqversion:10.0

Trust: 1.0

vendor:oraclemodel:healthcare master person indexscope:eqversion:4.0

Trust: 1.0

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.3.3

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:15.0.0.1

Trust: 1.0

vendor:oraclemodel:application testing suitescope:eqversion:12.5.0.3

Trust: 1.0

vendor:oraclemodel:health sciences information managerscope:eqversion:3.0

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:eqversion:15.2

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:14.1.3

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:15.0.1

Trust: 1.0

vendor:oraclemodel:retail open commerce platformscope:eqversion:6.0.1

Trust: 1.0

vendor:oraclemodel:insurance rules palettescope:eqversion:10.2

Trust: 1.0

vendor:oraclemodel:retail predictive application serverscope:eqversion:15.0

Trust: 1.0

vendor:oraclemodel:retail customer insightsscope:eqversion:16.0

Trust: 1.0

vendor:pivotalmodel:spring frameworkscope:eqversion:5.0.4

Trust: 0.9

vendor:pivotalmodel:spring frameworkscope:eqversion:5.0.3

Trust: 0.9

vendor:pivotalmodel:spring frameworkscope:eqversion:5.0.2

Trust: 0.9

vendor:pivotalmodel:spring frameworkscope:eqversion:5.0.1

Trust: 0.9

vendor:pivotalmodel:spring frameworkscope:ltversion:4.3

Trust: 0.8

vendor:pivotalmodel:spring frameworkscope:eqversion:4.3.15

Trust: 0.8

vendor:pivotalmodel:spring frameworkscope:ltversion:5.0

Trust: 0.8

vendor:pivotalmodel:spring frameworkscope:eqversion:5.0.5

Trust: 0.8

vendor:pivotalmodel:spring frameworkscope:eqversion:4.3.3

Trust: 0.6

vendor:pivotalmodel:spring frameworkscope:eqversion:4.3.1

Trust: 0.6

vendor:pivotalmodel:spring frameworkscope:eqversion:4.3.4

Trust: 0.6

vendor:pivotalmodel:spring frameworkscope:eqversion:4.3.0

Trust: 0.6

vendor:pivotalmodel:spring frameworkscope:eqversion:4.3.2

Trust: 0.6

vendor:pivotalmodel:spring frameworkscope:eqversion:4.2.9

Trust: 0.6

vendor:redhatmodel:jboss fusescope:eqversion:6.0

Trust: 0.3

vendor:redhatmodel:jboss fusescope:eqversion:7.0

Trust: 0.3

vendor:redhatmodel:jboss a-mqscope:eqversion:6.0

Trust: 0.3

vendor:pivotalmodel:spring frameworkscope:eqversion:5.0

Trust: 0.3

vendor:pivotalmodel:spring frameworkscope:eqversion:4.3.14

Trust: 0.3

vendor:pivotalmodel:spring frameworkscope:eqversion:4.3

Trust: 0.3

vendor:pivotalmodel:spring frameworkscope:neversion:5.0.5

Trust: 0.3

vendor:pivotalmodel:spring frameworkscope:neversion:4.3.15

Trust: 0.3

sources: BID: 103697 // JVNDB: JVNDB-2018-003099 // CNNVD: CNNVD-201804-243 // NVD: CVE-2018-1272

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-1272
value: HIGH

Trust: 1.0

NVD: CVE-2018-1272
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201804-243
value: HIGH

Trust: 0.6

VULHUB: VHN-122707
value: MEDIUM

Trust: 0.1

VULMON: CVE-2018-1272
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-1272
severity: MEDIUM
baseScore: 6.0
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-122707
severity: MEDIUM
baseScore: 6.0
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-1272
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.6
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2018-1272
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-122707 // VULMON: CVE-2018-1272 // JVNDB: JVNDB-2018-003099 // CNNVD: CNNVD-201804-243 // NVD: CVE-2018-1272

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-122707 // JVNDB: JVNDB-2018-003099 // NVD: CVE-2018-1272

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201804-243

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201804-243

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-003099

PATCH

title:CVE-2018-1272: Multipart Content Pollution with Spring Frameworkurl:https://pivotal.io/security/cve-2018-1272

Trust: 0.8

title:Pivotal Spring Framework Fixes for permission permissions and access control vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=83086

Trust: 0.6

title:Debian CVElist Bug Report Logs: libspring-java: CVE-2018-1270 CVE-2018-1272url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=cf592ea3b0a1913a29c923afe44cd4b7

Trust: 0.1

title:Red Hat: CVE-2018-1272url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2018-1272

Trust: 0.1

title:Red Hat: Important: Fuse 7.1 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182669 - Security Advisory

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=5f8c525f1408011628af1792207b2099

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2019url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=f655264a6935505d167bbf45f409a57b

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=81c63752a6f26433af2128b2e8c02385

Trust: 0.1

title:IBM: Security Bulletin: Multiple Vulnerabilities in IBM Guardium Data Encryption (GDE)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=3dea47d76eee003a50f853f241578c37

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM has announced a release for IBM Security Identity Governance and Intelligence in response to multiple security vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=55ea315dfb69fce8383762ac64250315

Trust: 0.1

title:gocartsurl:https://github.com/tomoyamachi/gocarts

Trust: 0.1

title:cybsecurl:https://github.com/ilmari666/cybsec

Trust: 0.1

sources: VULMON: CVE-2018-1272 // JVNDB: JVNDB-2018-003099 // CNNVD: CNNVD-201804-243

EXTERNAL IDS

db:NVDid:CVE-2018-1272

Trust: 3.1

db:BIDid:103697

Trust: 2.1

db:JVNDBid:JVNDB-2018-003099

Trust: 0.8

db:CNNVDid:CNNVD-201804-243

Trust: 0.7

db:AUSCERTid:ESB-2019.0544

Trust: 0.6

db:VULHUBid:VHN-122707

Trust: 0.1

db:VULMONid:CVE-2018-1272

Trust: 0.1

db:PACKETSTORMid:149311

Trust: 0.1

db:PACKETSTORMid:147489

Trust: 0.1

sources: VULHUB: VHN-122707 // VULMON: CVE-2018-1272 // BID: 103697 // JVNDB: JVNDB-2018-003099 // PACKETSTORM: 149311 // PACKETSTORM: 147489 // CNNVD: CNNVD-201804-243 // NVD: CVE-2018-1272

REFERENCES

url:http://www.securityfocus.com/bid/103697

Trust: 2.5

url:https://pivotal.io/security/cve-2018-1272

Trust: 2.1

url:https://access.redhat.com/errata/rhsa-2018:1320

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2018:2669

Trust: 1.9

url:http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Trust: 1.8

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html

Trust: 1.8

url:https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Trust: 1.8

url:https://www.oracle.com/security-alerts/cpujul2020.html

Trust: 1.8

url:https://www.oracle.com/security-alerts/cpuoct2021.html

Trust: 1.8

url:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-1272

Trust: 1.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-1272

Trust: 0.8

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/141286

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10872142

Trust: 0.6

url:https://www.auscert.org.au/bulletins/75922

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-identified-in-ibm-storediq/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-guardium-data-encryption-gde-3/

Trust: 0.6

url:https://www-01.ibm.com/support/docview.wss?uid=ibm10872142

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2018-1272

Trust: 0.5

url:http://pivotal.io/

Trust: 0.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=1564408

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-1271

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-1271

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=57444

Trust: 0.1

url:https://github.com/tomoyamachi/gocarts

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000129

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-0114

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000342

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000352

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000346

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1114

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5397

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-14063

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000343

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1338

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-14063

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000130

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000342

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000352

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1114

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000346

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000339

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000340

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000341

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000341

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.1/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0114

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-8088

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000343

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-8036

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000344

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000345

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000338

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=jboss.fuse&downloadtype=distributions&version=7.1.0

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000340

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000129

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1339

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000180

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1339

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000338

Trust: 0.1

url:https://access.redhat.com/articles/2939351

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000339

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000130

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-8036

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000180

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-8088

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5397

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1338

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-1000344

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1000345

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1304

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_openshift_application_runtimes/1/html/red_hat_openshift_application_runtimes_release_notes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1304

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1275

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=catrhoar.spring.boot&version=1.5.12

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1275

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1305

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1305

Trust: 0.1

sources: VULHUB: VHN-122707 // VULMON: CVE-2018-1272 // BID: 103697 // JVNDB: JVNDB-2018-003099 // PACKETSTORM: 149311 // PACKETSTORM: 147489 // CNNVD: CNNVD-201804-243 // NVD: CVE-2018-1272

CREDITS

Philippe Arteau from GoSecure.

Trust: 0.3

sources: BID: 103697

SOURCES

db:VULHUBid:VHN-122707
db:VULMONid:CVE-2018-1272
db:BIDid:103697
db:JVNDBid:JVNDB-2018-003099
db:PACKETSTORMid:149311
db:PACKETSTORMid:147489
db:CNNVDid:CNNVD-201804-243
db:NVDid:CVE-2018-1272

LAST UPDATE DATE

2024-11-23T21:25:46.875000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-122707date:2020-07-15T00:00:00
db:VULMONid:CVE-2018-1272date:2022-06-23T00:00:00
db:BIDid:103697date:2018-04-05T00:00:00
db:JVNDBid:JVNDB-2018-003099date:2018-05-14T00:00:00
db:CNNVDid:CNNVD-201804-243date:2021-10-21T00:00:00
db:NVDid:CVE-2018-1272date:2024-11-21T03:59:30.877

SOURCES RELEASE DATE

db:VULHUBid:VHN-122707date:2018-04-06T00:00:00
db:VULMONid:CVE-2018-1272date:2018-04-06T00:00:00
db:BIDid:103697date:2018-04-05T00:00:00
db:JVNDBid:JVNDB-2018-003099date:2018-05-14T00:00:00
db:PACKETSTORMid:149311date:2018-09-11T15:41:48
db:PACKETSTORMid:147489date:2018-05-04T01:11:44
db:CNNVDid:CNNVD-201804-243date:2018-04-06T00:00:00
db:NVDid:CVE-2018-1272date:2018-04-06T13:29:00.563