Vulnerability Name:

CVE-2018-1272

Assigned:2017-12-06
Published:2018-04-05
Updated:2018-07-18
Summary:Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.
CVSS v3 Severity:7.5 High (CVSS v3 Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)
6.5 Medium (Temporal CVSS v3 Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
5.0 Medium (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)
4.4 Medium (CCN Temporal CVSS v3 Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.0 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-264
References:Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Source: BID
Type: VENDOR_ADVISORY
103697

Source: REDHAT
Type: UNKNOWN
RHSA-2018:1320

Source: MISC
Type: VENDOR_ADVISORY
https://exchange.xforce.ibmcloud.com/vulnerabilities/141286

Source: XF
Type: UNKNOWN
pivotal-cve20181272-priv-esc(141286)

Source: CONFIRM
Type: VENDOR_ADVISORY
https://pivotal.io/security/cve-2018-1272

Vulnerable Configuration:Configuration 1:
  • cpe:/a:pivotal_software:spring_framework:4.2.9:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:4.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:4.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:4.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:4.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:4.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:4.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:4.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:4.3.7:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:4.3.8:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:4.3.9:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:4.3.10:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:4.3.11:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:4.3.12:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:4.3.13:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:4.3.14:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:5.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:5.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:5.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_framework:5.0.4:*:*:*:*:*:*:*

  • Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.artful:def:20181272000
    V
    CVE-2018-1272 on Ubuntu 17.10 (artful) - medium.
    2018-04-06
    oval:com.ubuntu.trusty:def:20181272000
    V
    CVE-2018-1272 on Ubuntu 14.04 LTS (trusty) - medium.
    2018-04-06
    oval:com.ubuntu.xenial:def:20181272000
    V
    CVE-2018-1272 on Ubuntu 16.04 LTS (xenial) - medium.
    2018-04-06
    BACK
    pivotal_software spring framework 4.2.9
    pivotal_software spring framework 4.3.0
    pivotal_software spring framework 4.3.1
    pivotal_software spring framework 4.3.2
    pivotal_software spring framework 4.3.3
    pivotal_software spring framework 4.3.4
    pivotal_software spring framework 4.3.5
    pivotal_software spring framework 4.3.6
    pivotal_software spring framework 4.3.7
    pivotal_software spring framework 4.3.8
    pivotal_software spring framework 4.3.9
    pivotal_software spring framework 4.3.10
    pivotal_software spring framework 4.3.11
    pivotal_software spring framework 4.3.12
    pivotal_software spring framework 4.3.13
    pivotal_software spring framework 4.3.14
    pivotal_software spring framework 5.0.0
    pivotal_software spring framework 5.0.1
    pivotal_software spring framework 5.0.2
    pivotal_software spring framework 5.0.3
    pivotal_software spring framework 5.0.4