CVE-2018-1257
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/05/2018
Last modified:
23/06/2022
Description
Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:* | 4.3.17 (excluding) | |
| cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:* | 5.0.0 (including) | 5.0.6 (excluding) |
| cpe:2.3:a:redhat:openshift:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:agile_product_lifecycle_management:9.3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:agile_product_lifecycle_management:9.3.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:agile_product_lifecycle_management:9.3.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:agile_product_lifecycle_management:9.3.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:application_testing_suite:12.5.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:application_testing_suite:13.1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:application_testing_suite:13.2.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:big_data_discovery:1.6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_converged_application_server:*:*:*:*:*:*:*:* | 7.0.0.1 (excluding) | |
| cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* | 8.3 (excluding) | |
| cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:* | 10.2.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/104260
- https://access.redhat.com/errata/RHSA-2018:1809
- https://access.redhat.com/errata/RHSA-2018:3768
- https://pivotal.io/security/cve-2018-1257
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html



