CVE-2018-1196 in Pivotal Software and VMware Products
Published on March 19, 2018
Spring Boot supports an embedded launch script that can be used to easily run the application as a systemd or init.d linux service. The script included with Spring Boot 1.5.9 and earlier and 2.0.0.M1 through 2.0.0.M7 is susceptible to a symlink attack which allows the "run_user" to overwrite and take ownership of any file on the same system. In order to instigate the attack, the application must be installed as a service and the "run_user" requires shell access to the server. Spring Boot application that are not installed as a service, or are not using the embedded launch script are not susceptible.
Products Associated with CVE-2018-1196
stack.watch emails you whenever new vulnerabilities are published in Pivotal Software Spring Boot or VMware Spring Boot. Just hit a watch button to start following.
Affected Versions
Dell EMC Spring Boot:- Version 1.5.0 - 1.5.9 is affected.
- Version 2.0.0.M1 - 2.0.0.M7 is affected.
Exploit Probability
EPSS
0.60%
Percentile
69.22%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.