[GHSA-p5hg-3xm3-gcjg] Spring Framework allows applications to expose STOMP over WebSocket endpoints
Updates
- References
- Source code location
Comments Add source code location and patch links related to CVE-2018-1270.
Hey @sunSUNQ, would you mind elaborating on the linkage here? I'm not sure I follow.
Hello, I have added two patches for this vulnerability. In the official advisory at https://spring.io/security/cve-2018-1270, it is mentioned that the vulnerability affects the spring-messaging module. The affected versions range from Spring Framework 4.3 to 4.3.15, and it is fixed in version 4.3.16. I have obtained all the commits between versions 4.3.15 and 4.3.16, and there are a total of five commits. Among them, only https://github.com/spring-projects/spring-framework/commit/0009806debb578e884f6dc98bd1f2dc668020021 satisfies the aforementioned component of the vulnerability. Therefore, this commit serves as the patch. Similarly, e0de9126ed8cf25cf141d3e66420da94e350708 is the fix for the vulnerability in the 5.x branch.
Hello, I'm looking forward to your response.
👋 This pull request has been marked as stale because it has been open with no activity. You can: comment on the issue or remove the stale label to hold stale off for a while, add the Keep label to hold stale off permanently, or do nothing. If you do nothing this pull request will be closed eventually by the stale bot. Please see CONTRIBUTING.md for more policy details.