Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.springframework.data/spring-data-commons
  4. ›
  5. CVE-2018-1274

CVE-2018-1274: Allocation of Resources Without Limits or Throttling

April 18, 2018 (updated May 14, 2024)

Spring Data Commons contain a property path parser vulnerability caused by unlimited resource allocation. An unauthenticated remote malicious user (or attacker) can issue requests against Spring Data REST endpoints or endpoints using property path parsing which can cause a denial of service (CPU and memory consumption).

References

  • www.securityfocus.com/bid/103769
  • nvd.nist.gov/vuln/detail/CVE-2018-1274
  • pivotal.io/security/cve-2018-1274

Code Behaviors & Features

Detect and mitigate CVE-2018-1274 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.13.0.RELEASE up to 1.13.10.RELEASE, all versions starting from 2.0.RELEASE up to 2.0.5.RELEASE

Fixed versions

  • 2.0.6.RELEASE

Solution

Upgrade to version 2.0.5.RELEASE or above.

Impact 7.5 HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

maven/org.springframework.data/spring-data-commons/CVE-2018-1274.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:36 +0000.