[ 
https://issues.apache.org/jira/browse/IGNITE-8713?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Andrew Mashenkov updated IGNITE-8713:
-------------------------------------
    Labels: CVE security  (was: security)

> Security vulnerabilities in spring-data-commons-1.13.1.RELEASE.jar
> ------------------------------------------------------------------
>
>                 Key: IGNITE-8713
>                 URL: https://issues.apache.org/jira/browse/IGNITE-8713
>             Project: Ignite
>          Issue Type: Bug
>          Components: security
>    Affects Versions: 2.5
>            Reporter: Harendra Rai
>            Priority: Major
>              Labels: CVE, security
>             Fix For: 2.6
>
>
> I am using Ignite for .NET and I have found following Security 
> vulnerabilities in *“spring-data-commons-1.13.1.RELEASE.jar”*
>  # CVE-2018-1273 
> ([https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1273])
> *Description*: Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 
> 2.0.5, and older unsupported versions, contain a property binder 
> vulnerability caused by improper neutralization of special elements. An 
> unauthenticated remote malicious user (or attacker) can supply specially 
> crafted request parameters against Spring Data REST backed HTTP resources or 
> using Spring Data's projection-based request payload binding hat can lead to 
> a remote code execution attack.
> *Fix*: Users of affected versions should apply the following mitigation:
>                2.0.x users should upgrade to 2.0.6
>                1.13.x users should upgrade to 1.13.11
>                Older versions should upgrade to a supported branch
> Releases that have fixed this issue include:
>                Spring Data REST 2.6.11 (Ingalls SR11)
>                Spring Data REST 3.0.6 (Kay SR6)
> There are no other mitigation steps necessary.
> Note that the use of authentication and authorization for endpoints, both of 
> which are provided by Spring Security, limits exposure to this vulnerability 
> to authorized users.
>        2. CVE-2018-1274 
> ([https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1274])
> Description: Spring Data Commons, versions 1.13 to 1.13.10, 2.0 to 2.0.5, and 
> older unsupported versions, contain a property path parser vulnerability 
> caused by unlimited resource allocation. An unauthenticated remote malicious 
> user (or attacker) can issue requests against Spring Data REST endpoints or 
> endpoints using property path parsing which can cause a denial of service 
> (CPU and memory consumption).
> *Fix*: Users of affected versions should apply the following mitigation:
>                2.0.x users should upgrade to 2.0.6
>                1.13.x users should upgrade to 1.13.11
>                Older versions should upgrade to a supported branch
> Releases that have fixed this issue include:
>                Spring Data REST 2.6.11 (Ingalls SR11)
>                Spring Data REST 3.0.6 (Kay SR6)
> There are no other mitigation steps necessary.
> Note that the use of authentication and authorization for endpoints, both of 
> which are provided by Spring Security, limits exposure to this vulnerability 
> to authorized users.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to