Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-1196


Spring Boot supports an embedded launch script that can be used to easily run the application as a systemd or init.d linux service. The script included with Spring Boot 1.5.9 and earlier and 2.0.0.M1 through 2.0.0.M7 is susceptible to a symlink attack which allows the "run_user" to overwrite and take ownership of any file on the same system. In order to instigate the attack, the application must be installed as a service and the "run_user" requires shell access to the server. Spring Boot application that are not installed as a service, or are not using the embedded launch script are not susceptible.


Published

2018-03-19T18:29:00.387

Last Modified

2024-11-21T03:59:22.490

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 5.9 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-59

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application vmware spring_boot ≤ 1.5.9 Yes
Application vmware spring_boot 2.0.0 Yes
Application vmware spring_boot 2.0.0 Yes
Application vmware spring_boot 2.0.0 Yes
Application vmware spring_boot 2.0.0 Yes
Application vmware spring_boot 2.0.0 Yes
Application vmware spring_boot 2.0.0 Yes
Application vmware spring_boot 2.0.0 Yes

References