Description
Spring Boot supports an embedded launch script that can be used to easily run the application as a systemd or init.d linux service. The script included with Spring Boot 1.5.9 and earlier and 2.0.0.M1 through 2.0.0.M7 is susceptible to a symlink attack which allows the "run_user" to overwrite and take ownership of any file on the same system. In order to instigate the attack, the application must be installed as a service and the "run_user" requires shell access to the server. Spring Boot application that are not installed as a service, or are not using the embedded launch script are not susceptible.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0721 | Spring Boot supports an embedded launch script that can be used to easily run the application as a systemd or init.d linux service. The script included with Spring Boot 1.5.9 and earlier and 2.0.0.M1 through 2.0.0.M7 is susceptible to a symlink attack which allows the "run_user" to overwrite and take ownership of any file on the same system. In order to instigate the attack, the application must be installed as a service and the "run_user" requires shell access to the server. Spring Boot application that are not installed as a service, or are not using the embedded launch script are not susceptible. |
Github GHSA |
GHSA-xx65-cc7g-9pfp | Moderate severity vulnerability that affects org.springframework.boot:spring-boot |
References
History
No history.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-09-16T17:27:35.008Z
Reserved: 2017-12-06T00:00:00.000Z
Link: CVE-2018-1196
No data.
Status : Modified
Published: 2018-03-19T18:29:00.387
Modified: 2024-11-21T03:59:22.490
Link: CVE-2018-1196
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA