摘要:
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.
安全等级: Low
公告ID: KylinSec-SA-2022-1680
发布日期: 2022年7月30日
关联CVE: CVE-2018-1275
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2018-1275 | KY3.4-4A | springframework | Unaffected |
CVE-2018-1275 | KY3.4-5A | springframework | Unaffected |
CVE-2018-1275 | KY3.5.1 | springframework | Unaffected |