Malicious PATCH requests can run arbitrary Java code on servers using outdated Spring Data REST and Spring Boot versions
Reporter | Title | Published | Views | Family All 16 |
---|---|---|---|---|
![]() | CVE-2017-8046 | 4 Jan 201806:00 | β | cvelist |
![]() | Arbitrary Code Execution | 25 Sep 201705:55 | β | veracode |
![]() | CVE-2017-8046 | 4 Jan 201806:29 | β | osv |
![]() | Remote code execution in PATCH requests in Spring Data REST | 13 May 202201:02 | β | osv |
![]() | CVE-2017-8046 | 4 Jan 201806:29 | β | cve |
![]() | CVE-2017-8046 | 4 Jan 201806:29 | β | nvd |
![]() | Spring Data REST PATCH Request Remote Code Execution | 15 Mar 201800:00 | β | packetstorm |
![]() | Spring Data REST < 2.6.9 (Ingalls SR9) / 3.0.1 (Kay SR1) - PATCH Request Remote Code Execution Ex | 16 Mar 201800:00 | β | zdt |
![]() | Remote code execution in PATCH requests in Spring Data REST | 13 May 202201:02 | β | github |
![]() | CVE-2017-8046 | 8 Mar 201804:49 | β | redhatcve |
Source | Link |
---|---|
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
securityfocus | www.securityfocus.com/bid/100948 |
pivotal | www.pivotal.io/security/cve-2017-8046 |
access | www.access.redhat.com/errata/RHSA-2018:2405 |
exploit-db | www.exploit-db.com/exploits/44289 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo