Unknown
CVE-2018-15756
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2018-15756
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- debian,
- oracle,
- vmware
Products
- agile plm 9.3.3,
- agile plm 9.3.4,
- agile plm 9.3.5,
- agile plm 9.3.6,
- communications brm - elastic charging engine 11.3,
- communications brm - elastic charging engine 12.0,
- communications converged application server - service controller 6.0,
- communications converged application server - service controller 6.1,
- communications diameter signaling router 8.0.0,
- communications diameter signaling router 8.1,
- communications diameter signaling router 8.2,
- communications diameter signaling router 8.2.1,
- communications element manager 8.1.1,
- communications element manager 8.2.0,
- communications element manager 8.2.1,
- communications online mediation controller 6.1,
- communications session report manager 8.0.0,
- communications session report manager 8.1.0,
- communications session report manager 8.1.1,
- communications session report manager 8.2.0,
- communications session report manager 8.2.1,
- communications session route manager 8.0.0,
- communications session route manager 8.1.0,
- communications session route manager 8.1.1,
- communications session route manager 8.2.0,
- communications session route manager 8.2.1,
- communications unified inventory management 7.3,
- communications unified inventory management 7.4.0,
- debian linux 9.0,
- endeca information discovery integrator 3.2.0,
- enterprise manager for fusion applications 13.3.0.0,
- enterprise manager ops center 12.3.3,
- financial services analytical applications infrastructure,
- flexcube private banking 12.0.1,
- flexcube private banking 12.0.3,
- flexcube private banking 12.1.0,
- goldengate application adapters 12.3.2.1.0,
- healthcare master person index 3.0,
- healthcare master person index 4.0.2,
- identity manager connector 9.0,
- insurance calculation engine 10.0,
- insurance calculation engine 10.1,
- insurance calculation engine 10.2,
- insurance calculation engine 9.7,
- insurance policy administration j2ee 10.0,
- insurance policy administration j2ee 10.1,
- insurance policy administration j2ee 10.2,
- insurance policy administration j2ee 10.2.0,
- insurance policy administration j2ee 10.2.4,
- insurance policy administration j2ee 11.0,
- insurance policy administration j2ee 11.1.0,
- insurance policy administration j2ee 11.2.0,
- insurance rules palette 10.0,
- insurance rules palette 10.1,
- insurance rules palette 10.2,
- insurance rules palette 10.2.0,
- insurance rules palette 10.2.4,
- insurance rules palette 11.0,
- insurance rules palette 11.0.2,
- insurance rules palette 11.1.0,
- insurance rules palette 11.2.0,
- mysql enterprise monitor,
- primavera analytics 18.8,
- primavera gateway 15.2,
- primavera gateway 16.2,
- primavera gateway 17.12,
- primavera gateway 18.8.0,
- rapid planning 12.1,
- rapid planning 12.2,
- retail advanced inventory planning 15.0,
- retail assortment planning 15.0,
- retail assortment planning 16.0,
- retail clearance optimization engine 14.0.5,
- retail financial integration 14.0,
- retail financial integration 14.1,
- retail financial integration 15.0,
- retail financial integration 16.0,
- retail integration bus 15.0,
- retail integration bus 15.0.3,
- retail integration bus 16.0,
- retail integration bus 16.0.3,
- retail invoice matching 12.0,
- retail invoice matching 13.0,
- retail invoice matching 13.1,
- retail invoice matching 13.2,
- retail invoice matching 14.0,
- retail invoice matching 14.1,
- retail markdown optimization 13.4.4,
- retail order broker 15.0,
- retail order broker 16.0,
- retail order broker 5.1,
- retail order broker 5.2,
- retail predictive application server 14.0.3,
- retail predictive application server 14.0.3.26,
- retail predictive application server 14.1.3,
- retail predictive application server 14.1.3.37,
- retail predictive application server 15.0.3,
- retail predictive application server 15.0.3.100,
- retail predictive application server 16.0,
- retail predictive application server 16.0.3,
- retail service backbone 15.0,
- retail service backbone 16.0,
- retail service backbone 16.0.1,
- retail xstore point of service 7.1,
- spring framework,
- spring framework 5.1.0,
- tape library acsls 8.5,
- webcenter sites 12.2.1.3.0,
- weblogic server 10.3.6.0.0,
- weblogic server 12.1.3.0.0,
- weblogic server 12.2.1.3.0,
- weblogic server 12.2.1.4.0
References
Advisory
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: