{"id":"CVE-2018-1270","details":"Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack.","aliases":["GHSA-p5hg-3xm3-gcjg"],"modified":"2026-04-10T04:02:29.202060Z","published":"2018-04-06T13:29:00.453Z","references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369%40%3Cissues.activemq.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe%40%3Cissues.activemq.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c%40%3Cissues.activemq.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1%40%3Cissues.activemq.apache.org%3E"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2939"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103696"},{"type":"ADVISORY","url":"https://pivotal.io/security/cve-2018-1270"},{"type":"ADVISORY","url":"https://www.exploit-db.com/exploits/44796/"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libfuse/libfuse","events":[{"introduced":"0"},{"last_affected":"1186ccaa8d5f0fb3fed384781ec9e89dd8060202"},{"introduced":"0"},{"last_affected":"1186ccaa8d5f0fb3fed384781ec9e89dd8060202"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.0"},{"introduced":"0"},{"last_affected":"3.0"}]}},{"type":"GIT","repo":"https://github.com/spring-projects/spring-framework","events":[{"introduced":"0"},{"fixed":"8da0e46ff253bab5783713078eae8898708996ba"},{"introduced":"f4f990b2c900a9b325fd0770d9064a188d073253"},{"fixed":"4b9bc50fd057bb20278dc137820159f600cce324"},{"introduced":"0"},{"fixed":"3767abea3a9ec4b76257c1f98d65bd9da57afd28"},{"introduced":"0"},{"last_affected":"299f8b15ad1f74ca769b396d915e8369623279f2"},{"introduced":"0"},{"last_affected":"5acffaa72da10ba42fe547eeea44d8615cbf99b9"},{"introduced":"0"},{"last_affected":"5a30a43b753a971ac8bf4005a8ccddeaff439d7e"},{"introduced":"0"},{"last_affected":"9d37de186ce38a24bff1132c02a4007335639c1b"},{"introduced":"0"},{"last_affected":"f07eed2b28b4b51e4f2167f2ec6cd4d8bd9295ad"},{"introduced":"0"},{"last_affected":"927b8c15ef20eaaa4002d4b2170cc536a6d6aa35"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"4.3.16"},{"introduced":"5.0.0"},{"fixed":"5.0.5"},{"introduced":"0"},{"fixed":"7.0.0.1"},{"introduced":"0"},{"last_affected":"4.0"},{"introduced":"0"},{"last_affected":"5.3.0"},{"introduced":"0"},{"last_affected":"6.0.0"},{"introduced":"0"},{"last_affected":"6.0.1"},{"introduced":"0"},{"last_affected":"5.1"},{"introduced":"0"},{"last_affected":"5.2"}]}}],"versions":["before_interruptible","debian_version_0_95-1","debian_version_1_0-1","fuse_0_9","fuse_0_95","fuse_1_1","fuse_1_1_pre2","fuse_1_9","fuse_2_2","fuse_2_2_pre1","fuse_2_2_pre4","fuse_2_2_pre5","fuse_2_2_pre6","fuse_2_3_0","fuse_2_3_pre1","fuse_2_3_pre2","fuse_2_3_pre3","fuse_2_3_pre4","fuse_2_3_pre5","fuse_2_3_pre6","fuse_2_3_pre7","fuse_2_3_rc1","fuse_2_4_0","fuse_2_4_0_pre2","fuse_2_4_0_rc1","fuse_2_4_1","fuse_2_5_0","fuse_2_5_0_pre1","fuse_2_5_0_pre2","fuse_2_6_0","fuse_2_6_0_pre1","fuse_2_6_0_pre2","fuse_2_6_0_pre3","fuse_2_6_0_rc1","fuse_2_6_0_rc2","fuse_2_6_0_rc3","fuse_2_6_1","fuse_2_7_0","fuse_2_7_0_rc1","fuse_2_7_1","fuse_2_7_2","fuse_2_7_2_before_indent","fuse_2_8_0","fuse_2_8_0_pre2","fuse_2_8_1","fuse_2_8_2","fuse_2_8_3","fuse_2_8_4","fuse_2_8_start","fuse_2_9_0","fuse_2_9_1","fuse_2_9_start","fuse_3_0_start","start","v3.2.0.M1","v3.2.0.M2","v3.2.0.RC1","v3.2.0.RC2-A","v3.2.0.RELEASE","v4.0.0.M1","v4.0.0.M2","v4.0.0.M3","v4.0.0.RC1","v4.0.0.RC2","v4.0.0.RELEASE","v5.1.0.RELEASE","v5.2.0.RELEASE","v5.3.0","v6.0.0","v6.0.1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"12.5.0.3"}]},{"events":[{"introduced":"0"},{"last_affected":"13.1.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"13.2.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"13.3.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"1.6.0"}]},{"events":[{"introduced":"0"},{"fixed":"8.3"}]},{"events":[{"introduced":"0"},{"fixed":"10.2.1"}]},{"events":[{"introduced":"0"},{"fixed":"6.1.0.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.2"}]},{"events":[{"introduced":"0"},{"last_affected":"12.3.3"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.3.1.1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.3.2.1"}]},{"events":[{"introduced":"0"},{"last_affected":"10.1.1"}]},{"events":[{"introduced":"0"},{"last_affected":"10.2"}]},{"events":[{"introduced":"0"},{"last_affected":"10.2.1"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.1"}]},{"events":[{"introduced":"0"},{"last_affected":"10.2"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]},{"events":[{"introduced":"0"},{"last_affected":"16.2"}]},{"events":[{"introduced":"0"},{"last_affected":"17.12"}]},{"events":[{"introduced":"0"},{"last_affected":"14.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.1"}]},{"events":[{"introduced":"0"},{"last_affected":"14.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"16.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"14.0.2"}]},{"events":[{"introduced":"0"},{"last_affected":"14.0.3"}]},{"events":[{"introduced":"0"},{"last_affected":"14.0.4"}]},{"events":[{"introduced":"0"},{"last_affected":"14.1.1"}]},{"events":[{"introduced":"0"},{"last_affected":"14.1.2"}]},{"events":[{"introduced":"0"},{"last_affected":"14.1.3"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0.2"}]},{"events":[{"introduced":"0"},{"last_affected":"16.0"}]},{"events":[{"introduced":"0"},{"last_affected":"16.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"16.0.2"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"16.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.1"}]},{"events":[{"introduced":"0"},{"last_affected":"14.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"16.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.1"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.1.3.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.2.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"1.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1270.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}