CVE-2017-8046
CRITICAL EXPLOITED IN THE WILD RANSOMWARE NUCLEIVmware Spring Boot < 1.5.9 - Improper Input Validation
Title source: ruleDescription
Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.
Exploits (13)
gitlab
by java-exploit · poc
https://gitlab.com/penetration-test-learn/10vuln/java-exploit/SpringBreakVulnerableApp
gitlab
by java-exploit · poc
https://gitlab.com/penetration-test-learn/10vuln/java-exploit/spring-break-cve-2017-8046
exploitdb
WORKING POC
by Antonio Francesco Sardella · javawebappsjava
https://www.exploit-db.com/exploits/44289
Nuclei Templates (1)
Spring Data REST < 2.6.9 (Ingalls SR9) / 3.0.1 (Kay SR1) - PATCH Request Remote Code Execution
CRITICALby domwhewell-sage
Shodan:
http.title:"eureka"
FOFA:
title="eureka"
Scores
CVSS v3
9.8
EPSS
0.9398
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2019-05-20
InTheWild.io
2022-05-25
Ransomware Use
Confirmed
Classification
CWE
CWE-20
Status
published
Affected Products (16)
vmware/spring_boot
< 1.5.9
vmware/spring_boot
vmware/spring_boot
vmware/spring_boot
vmware/spring_boot
vmware/spring_boot
pivotal_software/spring_data_rest
< 2.6.9
pivotal_software/spring_data_rest
pivotal_software/spring_data_rest
pivotal_software/spring_data_rest
pivotal_software/spring_data_rest
pivotal_software/spring_data_rest
pivotal_software/spring_data_rest
pivotal_software/spring_data_rest
pivotal_software/spring_data_rest
... and 1 more
Timeline
Published
Jan 04, 2018
Tracked Since
Feb 18, 2026