vendor:
Spring Data REST
by:
Antonio Francesco Sardella
9.8
CVSS
CRITICAL
RCE (Remote Code Execution)
94
CWE
Product Name: Spring Data REST
Affected Version From: Prior to 2.6.9 (Ingalls SR9), 3.0.1 (Kay SR1)
Affected Version To:
Patch Exists: YES
Related CWE: CVE-2017-8046
CPE: a:pivotal:spring_data_rest
Platforms Tested: Microsoft Windows 7, Xubuntu 17.10.1
2018
RCE in PATCH requests in Spring Data REST
This exploit targets a vulnerability in Spring Data REST that allows remote code execution (RCE) through malicious PATCH requests. The vulnerability affects Spring Data REST versions prior to 2.6.9 (Ingalls SR9) and 3.0.1 (Kay SR1). By exploiting this vulnerability, an attacker can execute arbitrary code on the server.
Mitigation:
To mitigate this vulnerability, it is recommended to update to Spring Data REST versions 2.6.9 (Ingalls SR9) or 3.0.1 (Kay SR1) or later. Additionally, proper input validation and sanitization should be implemented to prevent malicious PATCH requests.