Security for everyone

CVE-2018-1273 Scanner

Detects 'Remote Code Execution (RCE)' vulnerability in Spring Data Commons affects v. prior to 1.13 to 1.13.10, 2.0 to 2.0.5.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

15 sec

Scan only one


Parent Category

CVE-2018-1273 Scanner Detail

Spring Data Commons is an open-source project that aims to simplify the implementation of data access layers in Spring-based applications. It provides a consistent programming model for various data stores, including relational databases, NoSQL databases, and others. Spring Data Commons provides a set of abstractions on top of data access technologies, including query building, pagination, and auditing. Spring Data Commons version 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions have been found to have a vulnerability, CVE-2018-1273.

CVE-2018-1273 vulnerability in Spring Data Commons stems from the improper neutralization of specially crafted input. The vulnerability resides in Spring Data Commons' property binder, which fails to neutralize the input of certain parameters. This can allow unauthenticated remote attackers to exploit the vulnerability by sending a specially crafted request to the Spring Data REST-backed HTTP resources or using Spring Data's projection-based request payload binding. Upon successful exploitation, the attacker can execute remote code on the affected system.

When the CVE-2018-1273 vulnerability is exploited, attackers can take complete control of the affected system, execute arbitrary code, and access sensitive information. The remote code execution attack can lead to a complete compromise of the system, and the attacker can gain access to confidential data, alter or delete data, and install malware or other malicious software on the compromised system. The attackers can maintain persistence and continue to exploit the system even after the initial attack.

Thanks to the pro features of the platform, businesses and organizations can easily and quickly learn about vulnerabilities in their digital assets. The platform offers a comprehensive vulnerability assessment service that can identify vulnerabilities in digital assets, including applications, networks, and cloud environments. With the platform's rich set of features, businesses can monitor their entire digital asset inventory, generate reports, and receive timely alerts on critical issues. By leveraging the power of, businesses can stay ahead of emerging security threats and protect their digital assets from attackers.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture