You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/data/spring-data-commons/1.10.1.RELEASE/spring-data-commons-1.10.1.RELEASE.jar
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/data/spring-data-commons/1.10.1.RELEASE/spring-data-commons-1.10.1.RELEASE.jar
Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.
mend-for-jackfan.us.kgbot
changed the title
spring-data-jpa-1.8.1.RELEASE.jar: 2 vulnerabilities (highest severity is: 9.8) unreachable
spring-data-jpa-1.8.1.RELEASE.jar: 2 vulnerabilities (highest severity is: 9.8)
Mar 12, 2024
mend-for-jackfan.us.kgbot
changed the title
spring-data-jpa-1.8.1.RELEASE.jar: 2 vulnerabilities (highest severity is: 9.8)
spring-data-jpa-1.8.1.RELEASE.jar: 1 vulnerabilities (highest severity is: 9.8)
Apr 12, 2024
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/data/spring-data-commons/1.10.1.RELEASE/spring-data-commons-1.10.1.RELEASE.jar
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - spring-data-commons-1.10.1.RELEASE.jar
Global parent pom.xml to be used by Spring Data modules
Library home page: http://www.spring.io
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/data/spring-data-commons/1.10.1.RELEASE/spring-data-commons-1.10.1.RELEASE.jar
Dependency Hierarchy:
Found in base branch: vp-rem
Vulnerability Details
Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.
Publish Date: 2018-04-11
URL: CVE-2018-1273
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://tanzu.vmware.com/security/cve-2018-1273
Release Date: 2018-04-11
Fix Resolution (org.springframework.data:spring-data-commons): 1.13.11.RELEASE
Direct dependency fix Resolution (org.springframework.data:spring-data-jpa): 1.11.11.RELEASE
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: