Spring Cloud Data Flow Let Attackers Compromise The Server

A critical vulnerability has been discovered in Spring Cloud Data Flow, a microservices-based platform for streaming and batch data processing in Cloud Foundry and Kubernetes.

The flaw, identified in the Skipper server component, allows attackers to compromise the server by exploiting improper sanitization of the upload path.

CVE-2024-22263: Arbitrary File Write Vulnerability in Spring Cloud Data Flow

The Skipper server in Spring Cloud Data Flow is designed to receive upload package requests.

All-in-One Cybersecurity Platform for MSPs to provide full breach protection with a single tool, Watch a Full Demo 

However, due to inadequate sanitization of the upload path, a malicious user with access to the Skipper server API can craft an upload request that writes arbitrary files to any location on the file system.

This vulnerability can potentially lead to an entire server compromise.

The vulnerability affects the following versions of Spring Cloud Skipper:

  • 2.11.0 – 2.11.2
  • 2.10.x

To mitigate this vulnerability, affected users should upgrade to the corresponding fixed version.

The fixed versions are as follows:

Affected Version(s)Fix VersionAvailability
2.11.x2.11.3OSS
2.10.x2.11.3OSS

Users of Spring Cloud Data Flow are strongly advised to upgrade to version 2.11.3 or later to protect their systems from potential exploitation.

It is crucial to apply these updates promptly to ensure the security and integrity of the server.

This vulnerability highlights the importance of proper input sanitization in software development.

Organizations using Spring Cloud Data Flow should take immediate action to upgrade their systems and prevent any potential security breaches.

For more information and detailed instructions on upgrading, users can refer to the official Spring Cloud Data Flow documentation.

Get special offers from ANY.RUN Sandbox. Until May 31, get 6 months of free service or extra licenses. Sign up for free.

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Hackers Exploiting California Wildfire Sparks to Launching Phishing Attacks

As California grapples with devastating wildfires, communities are rallying to protect lives and property. Unfortunately,…

12 hours ago

AIRASHI Botnet Exploiting 0-Day Vulnerabilities In Large Scale DDoS Attacks

AISURU botnet launched a DDoS attack targeting Black Myth: Wukong distribution platforms in August 2024…

13 hours ago

New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware

Botnets are the networks of compromised devices that have evolved significantly since the internet's inception.…

13 hours ago

FTC Slams GoDaddy For Not Implement Standard Security Practices Following Major Breaches

The Federal Trade Commission (FTC) has announced that it will require GoDaddy Inc. to develop…

13 hours ago

Thousands of PHP-based Web Applications Exploited to Deploy Malware

A significant cybersecurity threat has emerged, threatening the integrity of thousands of PHP-based web applications.…

14 hours ago

W3 Total Cache Plugin Vulnerability Let Attackers Gain Unauthorized Access to Sensitive Data

A significant security vulnerability has been identified in the W3 Total Cache plugin for WordPress,…

16 hours ago