Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.springframework.boot/spring-boot
  4. ›
  5. CVE-2018-1196

CVE-2018-1196: Symlink privilege escalation attack via Spring Boot launch script

March 19, 2018 (updated April 20, 2018)

Spring Boot supports an embedded launch script that can be used to easily run the application as a systemd or init.d linux service. The script included with Spring Boot is susceptible to a symlink attack which allows the run_user to overwrite and take ownership of any file on the same system. In order to instigate the attack, the application must be installed as a service and the run_user requires shell access to the server.

References

  • pivotal.io/security/cve-2018-1196

Code Behaviors & Features

Detect and mitigate CVE-2018-1196 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.5.10

Fixed versions

  • 1.5.10.RELEASE

Solution

Upgrade to version 1.5.10.RELEASE or above.

Impact 5.9 MEDIUM

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-59: Improper Link Resolution Before File Access ('Link Following')

Source file

maven/org.springframework.boot/spring-boot/CVE-2018-1196.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:39 +0000.