Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.springframework.data/spring-data-commons@1.12.11.RELEASE
purl pkg:maven/org.springframework.data/spring-data-commons@1.12.11.RELEASE
Next non-vulnerable version 1.13.12.RELEASE
Latest non-vulnerable version 2.0.7.RELEASE
Risk 4.0
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-81j5-6v3h-v3cq
Aliases:
CVE-2018-1274
GHSA-5q8m-mqmx-pxp9
Spring Data Commons, versions 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property path parser vulnerability caused by unlimited resource allocation. An unauthenticated remote malicious user (or attacker) can issue requests against Spring Data REST endpoints or endpoints using property path parsing which can cause a denial of service (CPU and memory consumption).
1.13.11
Affected by 0 other vulnerabilities.
1.13.11.RELEASE
Affected by 1 other vulnerability.
2.0.6
Affected by 0 other vulnerabilities.
2.0.6.RELEASE
Affected by 1 other vulnerability.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-s8a4-9j7s-8fc8 Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack. CVE-2018-1273
GHSA-4fq3-mr56-cg6r