Spring Cloud Data Flow Let Attackers Compromise The Server

A critical vulnerability has been discovered in Spring Cloud Data Flow, a microservices-based platform for streaming and batch data processing in Cloud Foundry and Kubernetes.

The flaw, identified in the Skipper server component, allows attackers to compromise the server by exploiting improper sanitization of the upload path.

CVE-2024-22263: Arbitrary File Write Vulnerability in Spring Cloud Data Flow

The Skipper server in Spring Cloud Data Flow is designed to receive upload package requests.

All-in-One Cybersecurity Platform for MSPs to provide full breach protection with a single tool, Watch a Full Demo 

However, due to inadequate sanitization of the upload path, a malicious user with access to the Skipper server API can craft an upload request that writes arbitrary files to any location on the file system.

This vulnerability can potentially lead to an entire server compromise.

The vulnerability affects the following versions of Spring Cloud Skipper:

  • 2.11.0 – 2.11.2
  • 2.10.x

To mitigate this vulnerability, affected users should upgrade to the corresponding fixed version.

The fixed versions are as follows:

Affected Version(s)Fix VersionAvailability
2.11.x2.11.3OSS
2.10.x2.11.3OSS

Users of Spring Cloud Data Flow are strongly advised to upgrade to version 2.11.3 or later to protect their systems from potential exploitation.

It is crucial to apply these updates promptly to ensure the security and integrity of the server.

This vulnerability highlights the importance of proper input sanitization in software development.

Organizations using Spring Cloud Data Flow should take immediate action to upgrade their systems and prevent any potential security breaches.

For more information and detailed instructions on upgrading, users can refer to the official Spring Cloud Data Flow documentation.

Get special offers from ANY.RUN Sandbox. Until May 31, get 6 months of free service or extra licenses. Sign up for free.

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

New Phishing Attack Poses as Zoom Meeting Invites to Steal Login Credentials

A newly identified phishing campaign is targeting unsuspecting users by masquerading as urgent Zoom meeting…

9 hours ago

New Hannibal Stealer Uses Stealth and Obfuscation to Evade Detection

A newly identified piece of malware, dubbed the "Hannibal Stealer," has emerged as a significant…

9 hours ago

Chinese APT Hackers Target Organizations Using Korplug Loaders and Malicious USB Drives

Advanced persistent threat (APT) groups with ties to China have become persistent players in the…

9 hours ago

Cache Timing Techniques Used to Bypass Windows 11 KASLR and Reveal Kernel Base

Cache timing side-channel attacks have been used to circumvent Kernel Address Space Layout Randomization (KASLR)…

9 hours ago

Hackers Exploit AutoIT Scripts to Deploy Malware Targeting Windows Systems

Cybersecurity researchers have unearthed a sophisticated attack leveraging AutoIT, a long-standing scripting language known for…

11 hours ago

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands, Germany,…

12 hours ago