Pivotal Spring Batch Admin, all versions, does not contain cross site request forgery protection. A remote unauthenticated user could craft a malicious site that executes requests to Spring Batch Admin. This issue has not been patched because Spring Batch Admin has reached end of life.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/103463 | Third Party Advisory VDB Entry |
https://pivotal.io/security/cve-2018-1230 | Mitigation Vendor Advisory |
http://www.securityfocus.com/bid/103463 | Third Party Advisory VDB Entry |
https://pivotal.io/security/cve-2018-1230 | Mitigation Vendor Advisory |
Configurations
History
21 Nov 2024, 03:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/103463 - Third Party Advisory, VDB Entry | |
References | () https://pivotal.io/security/cve-2018-1230 - Mitigation, Vendor Advisory |
Information
Published : 2018-03-21 20:29
Updated : 2024-11-21 03:59
NVD link : CVE-2018-1230
Mitre link : CVE-2018-1230
CVE.ORG link : CVE-2018-1230
JSON object : View
Products Affected
pivotal_software
- spring_batch_admin
CWE
CWE-352
Cross-Site Request Forgery (CSRF)