ignite-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Harendra Rai (JIRA)" <j...@apache.org>
Subject [jira] [Created] (IGNITE-8713) Security vulnerabilities in spring-data-commons-1.13.1.RELEASE.jar
Date Tue, 05 Jun 2018 17:07:00 GMT
Harendra Rai created IGNITE-8713:
------------------------------------

             Summary: Security vulnerabilities in spring-data-commons-1.13.1.RELEASE.jar
                 Key: IGNITE-8713
                 URL: https://issues.apache.org/jira/browse/IGNITE-8713
             Project: Ignite
          Issue Type: Bug
          Components: security
    Affects Versions: 2.5
            Reporter: Harendra Rai
             Fix For: 2.6


I am using Ignite for .NET and I have found following Security vulnerabilities in *“spring-data-commons-1.13.1.RELEASE.jar”*
 # CVE-2018-1273 ([https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1273])

*Description*: Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older
unsupported versions, contain a property binder vulnerability caused by improper neutralization
of special elements. An unauthenticated remote malicious user (or attacker) can supply specially
crafted request parameters against Spring Data REST backed HTTP resources or using Spring
Data's projection-based request payload binding hat can lead to a remote code execution attack.

*Fix*: Users of affected versions should apply the following mitigation:

               2.0.x users should upgrade to 2.0.6

               1.13.x users should upgrade to 1.13.11

               Older versions should upgrade to a supported branch

Releases that have fixed this issue include:

               Spring Data REST 2.6.11 (Ingalls SR11)

               Spring Data REST 3.0.6 (Kay SR6)

There are no other mitigation steps necessary.

Note that the use of authentication and authorization for endpoints, both of which are provided
by Spring Security, limits exposure to this vulnerability to authorized users.
 # CVE-2018-1274 ([https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1274])

Description: Spring Data Commons, versions 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported
versions, contain a property path parser vulnerability caused by unlimited resource allocation.
An unauthenticated remote malicious user (or attacker) can issue requests against Spring Data
REST endpoints or endpoints using property path parsing which can cause a denial of service
(CPU and memory consumption).

*Fix*: Users of affected versions should apply the following mitigation:

               2.0.x users should upgrade to 2.0.6

               1.13.x users should upgrade to 1.13.11

               Older versions should upgrade to a supported branch

Releases that have fixed this issue include:

               Spring Data REST 2.6.11 (Ingalls SR11)

               Spring Data REST 3.0.6 (Kay SR6)

There are no other mitigation steps necessary.

Note that the use of authentication and authorization for endpoints, both of which are provided
by Spring Security, limits exposure to this vulnerability to authorized users.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Mime
View raw message