A critical vulnerability has been discovered in Spring Cloud Data Flow, a microservices-based platform for streaming and batch data processing in Cloud Foundry and Kubernetes.
The flaw, identified in the Skipper server component, allows attackers to compromise the server by exploiting improper sanitization of the upload path.
The Skipper server in Spring Cloud Data Flow is designed to receive upload package requests.
All-in-One Cybersecurity Platform for MSPs to provide full breach protection with a single tool, Watch a Full Demo
However, due to inadequate sanitization of the upload path, a malicious user with access to the Skipper server API can craft an upload request that writes arbitrary files to any location on the file system.
This vulnerability can potentially lead to an entire server compromise.
The vulnerability affects the following versions of Spring Cloud Skipper:
To mitigate this vulnerability, affected users should upgrade to the corresponding fixed version.
The fixed versions are as follows:
Affected Version(s) | Fix Version | Availability |
2.11.x | 2.11.3 | OSS |
2.10.x | 2.11.3 | OSS |
Users of Spring Cloud Data Flow are strongly advised to upgrade to version 2.11.3 or later to protect their systems from potential exploitation.
It is crucial to apply these updates promptly to ensure the security and integrity of the server.
This vulnerability highlights the importance of proper input sanitization in software development.
Organizations using Spring Cloud Data Flow should take immediate action to upgrade their systems and prevent any potential security breaches.
For more information and detailed instructions on upgrading, users can refer to the official Spring Cloud Data Flow documentation.
Get special offers from ANY.RUN Sandbox. Until May 31, get 6 months of free service or extra licenses. Sign up for free.
Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces its…
Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券), a…
In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series of…
Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive ransomware,…
In a recent cyberattack attributed to the Qilin ransomware group, threat actors successfully compromised a…
A newly uncovered cyber-espionage campaign, dubbed Operation HollowQuill, has been identified as targeting academic, governmental,…