Total vulnerabilities in the database
Spring Boot supports an embedded launch script that can be used to easily run the application as a systemd or init.d linux service. The script included with Spring Boot 1.5.9 and earlier and 2.0.0.M1 through 2.0.0.M7 is susceptible to a symlink attack which allows the "run_user" to overwrite and take ownership of any file on the same system. In order to instigate the attack, the application must be installed as a service and the "run_user" requires shell access to the server. Spring Boot application that are not installed as a service, or are not using the embedded launch script are not susceptible.
Software | From | Fixed in |
---|---|---|
vmware / spring_boot | - | 1.5.9.x |
vmware / spring_boot | 2.0.0-milestone2 | 2.0.0-milestone2.x |
vmware / spring_boot | 2.0.0-milestone1 | 2.0.0-milestone1.x |
vmware / spring_boot | 2.0.0-milestone4 | 2.0.0-milestone4.x |
vmware / spring_boot | 2.0.0-milestone3 | 2.0.0-milestone3.x |
vmware / spring_boot | 2.0.0-milestone5 | 2.0.0-milestone5.x |
vmware / spring_boot | 2.0.0-milestone6 | 2.0.0-milestone6.x |
vmware / spring_boot | 2.0.0-milestone7 | 2.0.0-milestone7.x |
![]() |
1.5.0 | 1.5.10 |