Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/105703 - Third Party Advisory, VDB Entry, URL Repurposed | |
References | () https://lists.apache.org/thread.html/339fd112517e4873695b5115b96acdddbfc8f83b10598528d37c7d12%40%3Cissues.activemq.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/77886fec378ee6064debb1efb6b464a4a0173b2ff0d151ed86d3a228%40%3Cissues.activemq.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/7b156ee50ba3ecce87b33c06bf7a749d84ffee55e69bfb5eca88fcc3%40%3Cissues.activemq.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/8a1fe70534fc52ff5c9db5ac29c55657f802cbefd7e9d9850c7052bd%40%3Cissues.activemq.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/a3071e11c6fbd593022074ec1b4693f6d948c2b02cfa4a5d854aed68%40%3Cissues.activemq.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/bb354962cb51fff65740d5fb1bc2aac56af577c06244b57c36f98e4d%40%3Cissues.activemq.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/d6a84f52db89804b0ad965f3ea2b24bb880edee29107a1c5069cc3dd%40%3Cissues.activemq.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/efaa52b0aa67aae7cbd9e6ef96945387e422d7ce0e65434570a37b1d%40%3Cissues.activemq.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/f8905507a2c94af6b08b72d7be0c4b8c6660e585f00abfafeccc86bc%40%3Cissues.activemq.apache.org%3E - | |
References | () https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html - Mailing List, Third Party Advisory | |
References | () https://pivotal.io/security/cve-2018-15756 - Vendor Advisory | |
References | () https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2020.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2020.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2021.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2020.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuoct2021.html - Not Applicable, Third Party Advisory | |
References | () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Third Party Advisory | |
References | () https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - Patch, Third Party Advisory |
07 Nov 2023, 02:53
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-10-18 22:29
Updated : 2024-11-21 03:51
NVD link : CVE-2018-15756
Mitre link : CVE-2018-15756
CVE.ORG link : CVE-2018-15756
JSON object : View
Products Affected
oracle
- financial_services_analytical_applications_infrastructure
- communications_online_mediation_controller
- retail_markdown_optimization
- flexcube_private_banking
- primavera_gateway
- endeca_information_discovery_integrator
- enterprise_manager_for_fusion_applications
- communications_session_route_manager
- communications_element_manager
- retail_financial_integration
- rapid_planning
- healthcare_master_person_index
- retail_order_broker
- agile_plm
- retail_clearance_optimization_engine
- communications_session_report_manager
- weblogic_server
- primavera_analytics
- goldengate_application_adapters
- retail_service_backbone
- insurance_policy_administration_j2ee
- communications_brm_-_elastic_charging_engine
- insurance_rules_palette
- retail_invoice_matching
- webcenter_sites
- enterprise_manager_ops_center
- retail_assortment_planning
- identity_manager_connector
- insurance_calculation_engine
- communications_diameter_signaling_router
- communications_converged_application_server_-_service_controller
- mysql_enterprise_monitor
- retail_integration_bus
- retail_predictive_application_server
- tape_library_acsls
- retail_advanced_inventory_planning
- retail_xstore_point_of_service
- communications_unified_inventory_management
debian
- debian_linux
vmware
- spring_framework
CWE