CVE-2017-8046
04.01.2018, 06:29
Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.Enginsight
Vendor | Product | Version |
---|---|---|
vmware | spring_boot | 𝑥 < 1.5.9 |
vmware | spring_boot | 2.0.0:milestone1 |
vmware | spring_boot | 2.0.0:milestone2 |
vmware | spring_boot | 2.0.0:milestone3 |
vmware | spring_boot | 2.0.0:milestone4 |
vmware | spring_boot | 2.0.0:milestone5 |
pivotal_software | spring_data_rest | 𝑥 < 2.6.9 |
pivotal_software | spring_data_rest | 3.0.0 |
pivotal_software | spring_data_rest | 3.0.0:m1 |
pivotal_software | spring_data_rest | 3.0.0:m2 |
pivotal_software | spring_data_rest | 3.0.0:m3 |
pivotal_software | spring_data_rest | 3.0.0:m4 |
pivotal_software | spring_data_rest | 3.0.0:rc1 |
pivotal_software | spring_data_rest | 3.0.0:rc2 |
pivotal_software | spring_data_rest | 3.0.0:rc3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References