E18-0jyu1
CVSS:
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
False Positive:
f
Variants:
3
Year:
2018
Description
This strike exploits a remote command injection vulnerability in the Pivotal Spring Web framework.
The vulnerability exists due to insufficient validation of user-supplied input to a STOMP broker in the spring-messaging module.
The vulnerability can be exploited by sending a specially crafted request to a STOMP broker, allowing arbitrary command execution in the context of the running service.
NOTE: When running in one-arm mode, the strike will start a process on the remote vulnerable server, depending on the variant chosen.
After each attack attempt, one must restart the Spring server to observe the malicious behavior.