Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1wNTI4LTNtdmYtZ3I4N84AA-Hu

Remote code execution in Spring Cloud Data Flow

In Spring Cloud Data Flow versions prior to 2.11.4, a malicious user who has access to the Skipper server api can use a crafted upload request to write an arbitrary file to any location on the file system which could lead to compromising the server

Permalink: https://github.com/advisories/GHSA-p528-3mvf-gr87
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wNTI4LTNtdmYtZ3I4N84AA-Hu
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 1 month ago
Updated: about 1 month ago


CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-p528-3mvf-gr87, CVE-2024-37084
References: Blast Radius: 11.5

Affected Packages

maven:org.springframework.cloud:spring-cloud-skipper
Dependent packages: 10
Dependent repositories: 15
Downloads:
Affected Version Ranges: < 2.11.4
Fixed in: 2.11.4
All affected versions: 2.5.0, 2.5.1, 2.5.2, 2.5.3, 2.5.4, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, 2.7.2, 2.7.3, 2.7.4, 2.8.0, 2.8.1, 2.8.2, 2.8.3, 2.8.4, 2.8.5, 2.8.6, 2.9.0, 2.9.1, 2.9.2, 2.9.3, 2.11.0, 2.11.1, 2.11.2, 2.11.3
All unaffected versions: 2.11.4