Spring Data Commons contain a property path parser vulnerability caused by unlimited resource allocation
High severity
GitHub Reviewed
Published
Oct 17, 2018
to the GitHub Advisory Database
•
Updated Mar 4, 2024
Package
Affected versions
< 1.13.11
>= 2.0.0, < 2.0.6
Patched versions
1.13.11
2.0.6
Description
Published by the National Vulnerability Database
Apr 18, 2018
Published to the GitHub Advisory Database
Oct 17, 2018
Reviewed
Jun 16, 2020
Last updated
Mar 4, 2024
Spring Data Commons, versions 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property path parser vulnerability caused by unlimited resource allocation. An unauthenticated remote malicious user (or attacker) can issue requests against Spring Data REST endpoints or endpoints using property path parsing which can cause a denial of service (CPU and memory consumption).
References