CVE-2018-1271
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
06/04/2018
Last modified:
23/06/2022
Description
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:* | 4.3.0 (including) | 4.3.15 (excluding) |
| cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:* | 5.0.0 (including) | 5.0.5 (excluding) |
| cpe:2.3:a:oracle:application_testing_suite:12.5.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:application_testing_suite:13.1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:application_testing_suite:13.2.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:big_data_discovery:1.6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_converged_application_server:*:*:*:*:*:*:*:* | 7.0.0.1 (excluding) | |
| cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* | 8.3 (excluding) | |
| cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:* | 10.2.1 (excluding) | |
| cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_services_gatekeeper:*:*:*:*:*:*:*:* | 6.1.0.4.0 (excluding) | |
| cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:goldengate_for_big_data:12.2.0.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/103699
- https://access.redhat.com/errata/RHSA-2018:1320
- https://access.redhat.com/errata/RHSA-2018:2669
- https://access.redhat.com/errata/RHSA-2018:2939
- https://pivotal.io/security/cve-2018-1271
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html



