#VU15467 Improper input validation in Pivotal Spring Framework


| Updated: 2018-10-23

Vulnerability identifier: #VU15467

Vulnerability risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-15756

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Pivotal Spring Framework
Server applications / Frameworks for developing and running applications

Vendor: Pivotal

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists in Pivotal Software Spring Framework due to improper handling of range requests. A remote attacker can send a specially crafted request that contains an additional range header with a high number of ranges or with wide ranges that overlap and cause the service to crash.

Mitigation
The vulnerability has been addressed in the version 4.3.20, 5.0.10, 5.1.1.

Vulnerable software versions

Pivotal Spring Framework: 5.1.0, 4.2 - 4.2.19, 4.3.0 - 4.3.18, 5.0.0 - 5.0.9


External links
http://pivotal.io/security/cve-2018-15756


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability