摘要:
Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack.
安全等级: Low
公告ID: KylinSec-SA-2022-1687
发布日期: 2022年7月30日
关联CVE: CVE-2018-1257
Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2018-1257 | KY3.4-4A | springframework | Unaffected |
CVE-2018-1257 | KY3.4-5 | springframework | Unaffected |
CVE-2018-1257 | KY3.5.1 | springframework | Unaffected |