Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used in combination with XMLBeam 1.4.14 or earlier versions, contains a property binder vulnerability caused by improper restriction of XML external entity references as underlying library XMLBeam does not restrict external reference expansion. An unauthenticated remote malicious user can supply specially crafted request parameters against Spring Data's projection-based request payload binding to access arbitrary files on the system.
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2018:1809 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2018:3768 | third party advisory vendor advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | |
https://pivotal.io/security/cve-2018-1259 | vendor advisory |