Vulnerabilities > CVE-2018-1271

047910
CVSS 5.9 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
NONE
Availability impact
NONE
network
high complexity
vmware
oracle
nessus

Summary

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.

Vulnerable Configurations

Part Description Count
Application
Vmware
31
Application
Oracle
83

D2sec

nameSpring MVC File Disclosure
urlhttp://www.d2sec.com/exploits/spring_mvc_file_disclosure.html

Nessus

NASL familyWindows
NASL idSPRING_CVE-2018-1271.NASL
descriptionThe remote Windows host contains a Spring Framework library version that is 4.3.x prior to 4.3.15 or 5.0.x prior to 5.0.5. It is, therefore, affected by a directory traversal vulnerability. An unauthenticated, remote attacker can exploit this, by sending a URI that contains directory traversal characters, to disclose the contents of files located outside of the server
last seen2020-06-01
modified2020-06-02
plugin id119846
published2018-12-21
reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/119846
titleSpring Framework 4.3.x < 4.3.15 / 5.0.x < 5.0.5 Windows Directory Traversal Vulnerability (CVE-2018-1271)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(119846);
  script_version("1.3");
  script_cvs_date("Date: 2019/04/30 14:30:16");

  script_cve_id("CVE-2018-1271");

  script_name(english:"Spring Framework 4.3.x < 4.3.15 / 5.0.x < 5.0.5 Windows Directory Traversal Vulnerability (CVE-2018-1271)");
  script_summary(english:"Checks version of Spring Framework.");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains a web application framework library that is
affected by a directory traversal vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote Windows host contains a Spring Framework library version
that is 4.3.x prior to 4.3.15 or 5.0.x prior to 5.0.5. It is,
therefore, affected by a directory traversal vulnerability. An
unauthenticated, remote attacker can exploit this, by sending a URI
that contains directory traversal characters, to disclose the
contents of files located outside of the server's restricted path.

Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.");
  script_set_attribute(attribute:"see_also", value:"https://pivotal.io/security/cve-2018-1271");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Spring Framework version 4.3.15 or 5.0.5 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-1271");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"d2_elliot_name", value:"Spring MVC File Disclosure");
  script_set_attribute(attribute:"exploit_framework_d2_elliot", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2018/04/05");
  script_set_attribute(attribute:"patch_publication_date", value:"2018/04/05");
  script_set_attribute(attribute:"plugin_publication_date", value:"2018/12/21");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"agent", value:"windows");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:pivotal_software:spring_framework");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("os_fingerprint.nasl", "jar_detect_win.nbin");
  script_require_keys("installed_sw/Pivotal Software Spring Framework", "Settings/ParanoidReport");
  exit(0);
}

include("vcf.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

app = "Pivotal Software Spring Framework";
get_install_count(app_name:app, exit_if_zero:TRUE);

# only Windows is affected
os = get_kb_item_or_exit("Host/OS");
if ('windows' >!< tolower(os))
  audit(AUDIT_OS_NOT, "Windows");

app_info = vcf::get_app_info(app:app, win_local:TRUE);

constraints = [
  { "min_version":"4.3", "fixed_version":"4.3.15" },
  { "min_version":"5.0", "fixed_version":"5.0.5" }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);

Redhat

advisories
  • rhsa
    idRHSA-2018:1320
  • rhsa
    idRHSA-2018:2669
  • rhsa
    idRHSA-2018:2939

The Hacker News

idTHN:D7C30FB307A1DC524FADFFBF2D1BEAB1
last seen2018-04-06
modified2018-04-06
published2018-04-05
reporterSwati Khandelwal
sourcehttps://thehackernews.com/2018/04/spring-framework-hacking.html
titleRemote Execution Flaw Threatens Apps Built Using Spring Framework — Patch Now