• 公告ID (KylinSec-SA-2022-1687)

摘要:

Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack.

安全等级: Low

公告ID: KylinSec-SA-2022-1687

发布日期: 2022年7月30日

关联CVE: CVE-2018-1257  

  • 详细介绍

1. 漏洞描述

   

Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2018-1257 KY3.4-4A springframework Unaffected
CVE-2018-1257 KY3.4-5 springframework Unaffected
CVE-2018-1257 KY3.5.1 springframework Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2022-1686 下一篇:KylinSec-SA-2022-1688