CVE-2018-1273
CRITICAL KEV RANSOMWARE NUCLEIPivotal Software Spring Data Commons < 1.12.10 - Code Injection
Title source: ruleDescription
Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.
Exploits (9)
github
175 stars
by wjl110 · javascriptpoc
https://github.com/wjl110/CVE-Master/tree/main/CVE-2018-1273-master
github
WORKING POC
5 stars
by JAckLosingHeart · javapoc
https://github.com/JAckLosingHeart/CVE-PoC-Collection/tree/main/spring-CVE-2018-1273
nomisec
STUB
by andikahilmy · poc
https://github.com/andikahilmy/CVE-2018-1273-spring-data-commons-vulnerable
Nuclei Templates (1)
Spring Data Commons - Remote Code Execution
CRITICALby dwisiswant0
References (4)
Scores
CVSS v3
9.8
EPSS
0.9429
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2022-03-25
VulnCheck KEV
2019-01-08
InTheWild.io
2019-03-13
ENISA EUVD
EUVD-2018-0500
Ransomware Use
Confirmed
Classification
CWE
CWE-94
Status
published
Affected Products (8)
pivotal_software/spring_data_commons
< 1.12.10
pivotal_software/spring_data_rest
< 2.5.10
apache/ignite
< 2.5.0
apache/ignite
apache/ignite
oracle/financial_services_crime_and_compliance_management_studio
oracle/financial_services_crime_and_compliance_management_studio
org.springframework.data/spring-data-commons
< 1.13.11Maven
Timeline
Published
Apr 11, 2018
KEV Added
Mar 25, 2022
Tracked Since
Feb 18, 2026