Get ahead
VMware offers training and certification to turbo-charge your progress.
Learn moreSpring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data’s projection-based request payload binding hat can lead to a remote code execution attack.
Users of affected versions should apply the following mitigation:
Releases that have fixed this issue include:
There are no other mitigation steps necessary.
Note that the use of authentication and authorization for endpoints, both of which are provided by Spring Security, limits exposure to this vulnerability to authorized users.
This issue was identified and responsibly reported by Philippe Arteau, GoSecure Inc.
2018-04-10: Initial vulnerability report published
To report a security vulnerability for a project within the Spring portfolio, see the Security Policy