CVE Name: CVE-2018-15756: Dos vulnerability on Vmware Spring Framework, Oracle Flexcube Private Banking, Oracle Insurance Policy Administration J2Ee, Oracle Retail Xstore Point Of Service, Oracle Weblogic Server, Oracle Retail Invoice Matching, Oracle Primavera Gateway, Oracle Communications Unified Inventory Management, Oracle Endeca Information Discovery Integrator, Oracle Enterprise Manager Ops Center, Oracle Healthcare Master Person Index, Oracle Insurance Calculation Engine, Oracle Insurance Rules Palette, Oracle Retail Integration Bus, Oracle Retail Order Broker, Oracle Retail Predictive Application Server, Oracle Retail Service Backbone, Oracle Webcenter Sites, Oracle Agile Plm, Oracle Communications Converged Application Server Service Controller, Oracle Communications Element Manager, Oracle Communications Online Mediation Controller, Oracle Communications Session Report Manager, Oracle Communications Session Route Manager, Oracle Enterprise Manager For Fusion Applications, Oracle Goldengate Application Adapters, Oracle Identity Manager Connector, Oracle Mysql Enterprise Monitor, Oracle Rapid Planning, Oracle Retail Assortment Planning, Oracle Retail Clearance Optimization Engine, Oracle Retail Financial Integration, Oracle Communications Brm Elastic Charging Engine, Oracle Communications Diameter Signaling Router, Oracle Financial Services Analytical Applications Infrastructure, Oracle Primavera Analytics, Oracle Retail Advanced Inventory Planning, Oracle Retail Markdown Optimization, Oracle Tape Library Acsls, Debian Debian Linux
Description: Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.
Publish date: 2018-10-18T22:29Z
Last Update: 2022-05-13T20:56Z