CVE-2018-11040 (CNNVD-201806-1190)
中文标题:
Pivotal Spring Framework 安全漏洞
英文标题:
Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported vers...
漏洞描述
中文描述:
Pivotal Spring Framework是美国Pivotal Software公司的一套开源的Java、Java EE应用程序框架。该框架可帮助开发人员构建高质量的应用。 Pivotal Spring Framework 5.0.7之前的5.0.x版本、4.3.18之前的4.3.x版本和不再支持的更早版本中存在安全漏洞,该漏洞源于程序允许Web应用程序通过JSONP打开跨域的请求。攻击者可利用该漏洞将用户信息泄露到第三方浏览器脚本。
英文描述:
Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the "jsonp" and "callback" JSONP parameters, enabling cross-domain requests.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Pivotal | Spring Framework | - | < 5.0.7 | - |
cpe:2.3:a:pivotal:spring_framework:*:*:*:*:*:*:*:*
|
| vmware | spring_framework | * | - | - |
cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*
|
| oracle | agile_product_lifecycle_management | 9.3.3 | - | - |
cpe:2.3:a:oracle:agile_product_lifecycle_management:9.3.3:*:*:*:*:*:*:*
|
| oracle | agile_product_lifecycle_management | 9.3.4 | - | - |
cpe:2.3:a:oracle:agile_product_lifecycle_management:9.3.4:*:*:*:*:*:*:*
|
| oracle | agile_product_lifecycle_management | 9.3.5 | - | - |
cpe:2.3:a:oracle:agile_product_lifecycle_management:9.3.5:*:*:*:*:*:*:*
|
| oracle | application_testing_suite | 12.5.0.3 | - | - |
cpe:2.3:a:oracle:application_testing_suite:12.5.0.3:*:*:*:*:*:*:*
|
| oracle | application_testing_suite | 13.1.0.1 | - | - |
cpe:2.3:a:oracle:application_testing_suite:13.1.0.1:*:*:*:*:*:*:*
|
| oracle | application_testing_suite | 13.2.0.1 | - | - |
cpe:2.3:a:oracle:application_testing_suite:13.2.0.1:*:*:*:*:*:*:*
|
| oracle | application_testing_suite | 13.3.0.1 | - | - |
cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*
|
| oracle | communications_network_integrity | * | - | - |
cpe:2.3:a:oracle:communications_network_integrity:*:*:*:*:*:*:*:*
|
| oracle | communications_online_mediation_controller | 6.1 | - | - |
cpe:2.3:a:oracle:communications_online_mediation_controller:6.1:*:*:*:*:*:*:*
|
| oracle | communications_services_gatekeeper | * | - | - |
cpe:2.3:a:oracle:communications_services_gatekeeper:*:*:*:*:*:*:*:*
|
| oracle | communications_unified_inventory_management | 7.3.2 | - | - |
cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.2:*:*:*:*:*:*:*
|
| oracle | communications_unified_inventory_management | 7.3.4 | - | - |
cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*
|
| oracle | communications_unified_inventory_management | 7.3.5 | - | - |
cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*
|
| oracle | communications_unified_inventory_management | 7.4.0 | - | - |
cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*
|
| oracle | endeca_information_discovery_integrator | 3.1.0 | - | - |
cpe:2.3:a:oracle:endeca_information_discovery_integrator:3.1.0:*:*:*:*:*:*:*
|
| oracle | endeca_information_discovery_integrator | 3.2.0 | - | - |
cpe:2.3:a:oracle:endeca_information_discovery_integrator:3.2.0:*:*:*:*:*:*:*
|
| oracle | enterprise_manager | 13.2 | - | - |
cpe:2.3:a:oracle:enterprise_manager:13.2:*:*:*:*:mysql:*:*
|
| oracle | enterprise_manager_ops_center | 12.3.3 | - | - |
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
|
| oracle | flexcube_private_banking | 2.0.0.0 | - | - |
cpe:2.3:a:oracle:flexcube_private_banking:2.0.0.0:*:*:*:*:*:*:*
|
| oracle | flexcube_private_banking | 2.2.0.1 | - | - |
cpe:2.3:a:oracle:flexcube_private_banking:2.2.0.1:*:*:*:*:*:*:*
|
| oracle | flexcube_private_banking | 12.0.1.0 | - | - |
cpe:2.3:a:oracle:flexcube_private_banking:12.0.1.0:*:*:*:*:*:*:*
|
| oracle | flexcube_private_banking | 12.0.3.0 | - | - |
cpe:2.3:a:oracle:flexcube_private_banking:12.0.3.0:*:*:*:*:*:*:*
|
| oracle | flexcube_private_banking | 12.1.0.0 | - | - |
cpe:2.3:a:oracle:flexcube_private_banking:12.1.0.0:*:*:*:*:*:*:*
|
| oracle | healthcare_master_person_index | 3.0 | - | - |
cpe:2.3:a:oracle:healthcare_master_person_index:3.0:*:*:*:*:*:*:*
|
| oracle | healthcare_master_person_index | 4.0 | - | - |
cpe:2.3:a:oracle:healthcare_master_person_index:4.0:*:*:*:*:*:*:*
|
| oracle | hospitality_guest_access | 4.2.0 | - | - |
cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*
|
| oracle | hospitality_guest_access | 4.2.1 | - | - |
cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*
|
| oracle | insurance_calculation_engine | * | - | - |
cpe:2.3:a:oracle:insurance_calculation_engine:*:*:*:*:*:*:*:*
|
| oracle | insurance_rules_palette | 10.0 | - | - |
cpe:2.3:a:oracle:insurance_rules_palette:10.0:*:*:*:*:*:*:*
|
| oracle | insurance_rules_palette | 10.2 | - | - |
cpe:2.3:a:oracle:insurance_rules_palette:10.2:*:*:*:*:*:*:*
|
| oracle | micros_lucas | 2.9.5 | - | - |
cpe:2.3:a:oracle:micros_lucas:2.9.5:*:*:*:*:*:*:*
|
| oracle | mysql_enterprise_monitor | * | - | - |
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
| oracle | product_lifecycle_management | 9.3.6 | - | - |
cpe:2.3:a:oracle:product_lifecycle_management:9.3.6:*:*:*:*:*:*:*
|
| oracle | retail_advanced_inventory_planning | 15.0 | - | - |
cpe:2.3:a:oracle:retail_advanced_inventory_planning:15.0:*:*:*:*:*:*:*
|
| oracle | retail_clearance_optimization_engine | 14.0.5 | - | - |
cpe:2.3:a:oracle:retail_clearance_optimization_engine:14.0.5:*:*:*:*:*:*:*
|
| oracle | retail_customer_insights | 15.0 | - | - |
cpe:2.3:a:oracle:retail_customer_insights:15.0:*:*:*:*:*:*:*
|
| oracle | retail_customer_insights | 16.0 | - | - |
cpe:2.3:a:oracle:retail_customer_insights:16.0:*:*:*:*:*:*:*
|
| oracle | retail_markdown_optimization | 13.4.4 | - | - |
cpe:2.3:a:oracle:retail_markdown_optimization:13.4.4:*:*:*:*:*:*:*
|
| oracle | retail_predictive_application_server | 14.0.3.26 | - | - |
cpe:2.3:a:oracle:retail_predictive_application_server:14.0.3.26:*:*:*:*:*:*:*
|
| oracle | retail_predictive_application_server | 14.1.3.37 | - | - |
cpe:2.3:a:oracle:retail_predictive_application_server:14.1.3.37:*:*:*:*:*:*:*
|
| oracle | retail_predictive_application_server | 15.0.3.100 | - | - |
cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3.100:*:*:*:*:*:*:*
|
| oracle | retail_predictive_application_server | 16.0 | - | - |
cpe:2.3:a:oracle:retail_predictive_application_server:16.0:*:*:*:*:*:*:*
|
| oracle | retail_service_backbone | 16.0.1 | - | - |
cpe:2.3:a:oracle:retail_service_backbone:16.0.1:*:*:*:*:*:*:*
|
| oracle | retail_xstore_point_of_service | 7.1 | - | - |
cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
|
| oracle | utilities_network_management_system | 1.12.0.3 | - | - |
cpe:2.3:a:oracle:utilities_network_management_system:1.12.0.3:*:*:*:*:*:*:*
|
| oracle | weblogic_server | 12.2.1.3.0 | - | - |
cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 9.0 | - | - |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2018-11040 |
2025-11-11 15:19:37 | 2025-11-11 07:35:00 |
| NVD | nvd_CVE-2018-11040 |
2025-11-11 14:55:55 | 2025-11-11 07:43:36 |
| CNNVD | cnnvd_CNNVD-201806-1190 |
2025-11-11 15:10:02 | 2025-11-11 07:53:46 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-201806-1190
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.5
- cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- cvss_version: NOT_EXTRACTED -> 3.1
- affected_products_count: 2 -> 49
- data_sources: ['cve'] -> ['cve', 'nvd']