9.8

CVE-2018-1270

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack.

Data is provided by the National Vulnerability Database (NVD)
VMwareSpring Framework Version < 4.3.16
VMwareSpring Framework Version >= 5.0.0 < 5.0.5
OracleApplication Testing Suite Version12.5.0.3
OracleApplication Testing Suite Version13.1.0.1
OracleApplication Testing Suite Version13.2.0.1
OracleApplication Testing Suite Version13.3.0.1
OracleBig Data Discovery Version1.6.0
OracleGoldengate For Big Data Version12.2.0.1
OracleGoldengate For Big Data Version12.3.1.1
OracleGoldengate For Big Data Version12.3.2.1
OraclePrimavera Gateway Version15.2
OraclePrimavera Gateway Version16.2
OraclePrimavera Gateway Version17.12
OracleRetail Back Office Version14.0
OracleRetail Back Office Version14.1
OracleRetail Central Office Version14.0
OracleRetail Central Office Version14.1
OracleRetail Integration Bus Version14.0.1
OracleRetail Integration Bus Version14.0.2
OracleRetail Integration Bus Version14.0.3
OracleRetail Integration Bus Version14.0.4
OracleRetail Integration Bus Version14.1.1
OracleRetail Integration Bus Version14.1.2
OracleRetail Integration Bus Version14.1.3
OracleRetail Integration Bus Version15.0.0.1
OracleRetail Integration Bus Version15.0.1
OracleRetail Integration Bus Version15.0.2
OracleRetail Integration Bus Version16.0
OracleRetail Integration Bus Version16.0.1
OracleRetail Integration Bus Version16.0.2
OracleRetail Order Broker Version5.1
OracleRetail Order Broker Version5.2
OracleRetail Order Broker Version15.0
OracleRetail Order Broker Version16.0
OracleRetail Point-of-sale Version14.0
OracleRetail Point-of-sale Version14.1
OracleTape Library Acsls Version8.4
RedhatFuse Version1.0.0
DebianDebian Linux Version9.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 89.35% 0.995
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-358 Improperly Implemented Security Check for Standard

The product does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.

CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.

http://www.securityfocus.com/bid/103696
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/44796/
Third Party Advisory
Broken Link
VDB Entry