In Spring Cloud Data Flow versions prior to 2.11.4, a malicious user who has access to the Skipper server api can use a crafted upload request to write an arbitrary file to any location on the file system which could lead to compromising the server
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://spring.io/security/cve-2024-37084 |
![]() ![]() ![]() |
History
Mon, 26 Aug 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Vmware
Vmware spring Cloud Data Flow |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:vmware:spring_cloud_data_flow:*:*:*:*:*:*:*:* | |
Vendors & Products |
Vmware
Vmware spring Cloud Data Flow |

Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2024-08-02T03:43:50.987Z
Reserved: 2024-06-03T05:40:17.632Z
Link: CVE-2024-37084

Updated: 2024-08-02T03:43:50.987Z

Status : Modified
Published: 2024-07-25T10:15:07.260
Modified: 2024-11-21T09:23:09.750
Link: CVE-2024-37084

No data.