CVE-2017-8046
Summary
| CVE | CVE-2017-8046 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-01-04 06:29:00 UTC |
| Updated | 2022-04-07 15:03:00 UTC |
| Description | Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Pivotal Software | Spring Boot | All | All | All | All |
| Application | Pivotal Software | Spring Boot | 2.0.0 | m1 | All | All |
| Application | Pivotal Software | Spring Boot | 2.0.0 | m2 | All | All |
| Application | Pivotal Software | Spring Boot | 2.0.0 | m3 | All | All |
| Application | Pivotal Software | Spring Boot | 2.0.0 | m4 | All | All |
| Application | Pivotal Software | Spring Boot | 2.0.0 | m5 | All | All |
| Application | Pivotal Software | Spring Boot | All | All | All | All |
| Application | Pivotal Software | Spring Boot | 2.0.0 | m1 | All | All |
| Application | Pivotal Software | Spring Boot | 2.0.0 | m2 | All | All |
| Application | Pivotal Software | Spring Boot | 2.0.0 | m3 | All | All |
| Application | Pivotal Software | Spring Boot | 2.0.0 | m4 | All | All |
| Application | Pivotal Software | Spring Boot | 2.0.0 | m5 | All | All |
| Application | Pivotal Software | Spring Data Rest | All | All | All | All |
| Application | Pivotal Software | Spring Data Rest | 3.0.0 | All | All | All |
| Application | Pivotal Software | Spring Data Rest | 3.0.0 | m1 | All | All |
| Application | Pivotal Software | Spring Data Rest | 3.0.0 | m2 | All | All |
| Application | Pivotal Software | Spring Data Rest | 3.0.0 | m3 | All | All |
| Application | Pivotal Software | Spring Data Rest | 3.0.0 | m4 | All | All |
| Application | Pivotal Software | Spring Data Rest | 3.0.0 | rc1 | All | All |
| Application | Pivotal Software | Spring Data Rest | 3.0.0 | rc2 | All | All |
| Application | Pivotal Software | Spring Data Rest | 3.0.0 | rc3 | All | All |
| Application | Pivotal Software | Spring Data Rest | All | All | All | All |
| Application | Pivotal Software | Spring Data Rest | 3.0.0 | All | All | All |
| Application | Pivotal Software | Spring Data Rest | 3.0.0 | m1 | All | All |
| Application | Pivotal Software | Spring Data Rest | 3.0.0 | m2 | All | All |
| Application | Pivotal Software | Spring Data Rest | 3.0.0 | m3 | All | All |
| Application | Pivotal Software | Spring Data Rest | 3.0.0 | m4 | All | All |
| Application | Pivotal Software | Spring Data Rest | 3.0.0 | rc1 | All | All |
| Application | Pivotal Software | Spring Data Rest | 3.0.0 | rc2 | All | All |
| Application | Pivotal Software | Spring Data Rest | 3.0.0 | rc3 | All | All |
| Application | Vmware | Spring Boot | All | All | All | All |
| Application | Vmware | Spring Boot | 2.0.0 | milestone1 | All | All |
| Application | Vmware | Spring Boot | 2.0.0 | milestone2 | All | All |
| Application | Vmware | Spring Boot | 2.0.0 | milestone3 | All | All |
| Application | Vmware | Spring Boot | 2.0.0 | milestone4 | All | All |
| Application | Vmware | Spring Boot | 2.0.0 | milestone5 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Red Hat Customer Portal | REDHAT | access.redhat.com | |
| Multiple Pivotal Products CVE-2017-8046 Remote Code Execution Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Spring Data REST < 2.6.9 (Ingalls SR9) / 3.0.1 (Kay SR1) - PATCH Request Remote Code Execution - Java webapps Exploit | EXPLOIT-DB | www.exploit-db.com | Third Party Advisory, VDB Entry |
| CVE-2017-8046: RCE in PATCH requests in Spring Data REST | Security | Pivotal | CONFIRM | pivotal.io | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.