Spring Data REST Vulnerability [CVE-2017-8046]
CUE Number – CVE-2017-8046
A vulnerability in Pivotal’s Spring Data Java web application development framework may allow an authenticated remote attacker to execute arbitrary code on a targeted device.
The Spring Data REST project is used by Java developers to link common additional features to their applications. It is amongst the most popular Java development frameworks, with most modern Java web applications using some REST interfaces.
An error in Spring’s coding language, SpEL, used within Data REST can allow specially crafted PATCH requests to be submitted to a targeted server using HTTP resources. These requests can contain JSON data, which an attacker can use to cause the server to execute any code the attacker wishes.
Key Points
Affected Platforms
- Pivotal Spring Data REST – Versions prior to 2.5.12, 2.6.7 and 3.0 RC3
- Pivotal Spring Boot – Versions prior to 2.0.0M4
- Pivotal Spring Data – Release trains prior to Kay-RC3
Resolution
Pivotal have issued a patch for the issue as part of their Spring Boot 2.0 update. Users and administrators are encouraged to review and install this patch immediately.
![Spring Data REST Vulnerability [CVE-2017-8046]](https://i0.wp.com/www.systemtek.co.uk/wp-content/uploads/2022/01/blank-profile-hi.png?resize=100%2C100)
Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.