• 公告ID (KylinSec-SA-2022-1680)

摘要:

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.

安全等级: Low

公告ID: KylinSec-SA-2022-1680

发布日期: 2022年7月30日

关联CVE: CVE-2018-1275  

  • 详细介绍

1. 漏洞描述

   

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2018-1275 KY3.4-4A springframework Unaffected
CVE-2018-1275 KY3.4-5A springframework Unaffected
CVE-2018-1275 KY3.5.1 springframework Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2022-1679 下一篇:KylinSec-SA-2022-1681