# N/A
## 漏洞概述
Spring Data Commons的某些版本存在一个属性绑定漏洞,该漏洞可能导致远程代码执行攻击。漏洞源于对特殊元素的不当中和。
## 影响版本
- 1.13到1.13.10之前的版本
- 2.0到2.0.5版本
- 更旧的不支持版本
## 细节
未经身份验证的远程恶意用户可以通过构造特殊的请求参数,针对由Spring Data REST支持的HTTP资源或使用Spring Data基于投影的请求负载绑定,来触发此漏洞。
## 影响
由于该漏洞的存在,攻击者可以利用它进行远程代码执行攻击,从而对系统造成潜在危害。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Environment for CVE-2018-1273 (Spring Data Commons) | https://github.com/knqyf263/CVE-2018-1273 | POC详情 |
2 | POC for CVE-2018-1273 | https://github.com/wearearima/poc-cve-2018-1273 | POC详情 |
3 | None | https://github.com/webr0ck/poc-cve-2018-1273 | POC详情 |
4 | cve-2018-1273 | https://github.com/cved-sources/cve-2018-1273 | POC详情 |
5 | Spring Data Commons RCE 远程命令执行漏洞 | https://github.com/jas502n/cve-2018-1273 | POC详情 |
6 | Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-1273.yaml | POC详情 |
7 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Spring%20Data%20Commons%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2018-1273.md | POC详情 |
8 | https://github.com/vulhub/vulhub/blob/master/spring/CVE-2018-1273/README.md | POC详情 | |
9 | None | https://github.com/hdgokani/CVE-2018-1273 | POC详情 |
暂无评论