CVE-2017-8046
CRITICAL EXPLOITED IN THE WILD RANSOMWARE NUCLEIVmware Spring Boot < 1.5.9 - Improper Input Validation
Title source: ruleDescription
Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.
Exploits (13)
exploitdb
WORKING POC
by Antonio Francesco Sardella · javawebappsjava
https://www.exploit-db.com/exploits/44289
gitlab
by java-exploit · poc
https://gitlab.com/penetration-test-learn/10vuln/java-exploit/spring-break-cve-2017-8046
gitlab
by java-exploit · poc
https://gitlab.com/penetration-test-learn/10vuln/java-exploit/SpringBreakVulnerableApp
Nuclei Templates (1)
Spring Data REST < 2.6.9 (Ingalls SR9) / 3.0.1 (Kay SR1) - PATCH Request Remote Code Execution
CRITICALby domwhewell-sage
Shodan:
http.title:"eureka"
FOFA:
title="eureka"
Scores
CVSS v3
9.8
EPSS
0.9398
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2019-05-20
InTheWild.io
2022-05-25
Ransomware Use
Confirmed
CWE
CWE-20
Status
published
Products (5)
org.springframework.data/spring-data-rest-core
0 - 2.6.9.RELEASEMaven
pivotal_software/spring_data_rest
3.0.0 (8 CPE variants)
pivotal_software/spring_data_rest
< 2.6.9
vmware/spring_boot
2.0.0 milestone1 (5 CPE variants)
vmware/spring_boot
< 1.5.9
Published
Jan 04, 2018
Tracked Since
Feb 18, 2026