Files
CVEs-PoC/2018/CVE-2018-1275.md
T
2024-06-18 02:51:15 +02:00

30 lines
1.6 KiB
Markdown

### [CVE-2018-1275](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1275)
![](https://img.shields.io/static/v1?label=Product&message=Spring%20Framework&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%20-%20Code%20Injection&color=brighgreen)
### Description
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.
### POC
#### Reference
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Whoopsunix/PPPRASP
- https://github.com/Whoopsunix/PPPVULNS
- https://github.com/bkhablenko/CVE-2017-8046
- https://github.com/ilmari666/cybsec
- https://github.com/lnick2023/nicenice
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/tomoyamachi/gocarts
- https://github.com/xbl3/awesome-cve-poc_qazbnm456