Cross-site Request Forgery (CSRF) Affecting org.springframework.batch:spring-batch-admin package, versions [,1.3.0.RELEASE)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.12% (48th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGSPRINGFRAMEWORKBATCH-31567
  • published5 Nov 2017
  • disclosed17 Aug 2017
  • creditWen Bin

Introduced: 17 Aug 2017

CVE-2017-12881  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

Upgrade org.springframework.batch:spring-batch-admin to version 1.3.0.RELEASE or higher.

Overview

org.springframework.batch:spring-batch-admin is an web application and API for managing and monitoring Spring Batch jobs.

Affected versions of the package are vulnerable to Cross-site Request Forgery (CSRF). Cross-site request forgery (CSRF) vulnerability in the Spring Batch Admin before 1.3.0 allows remote attackers to hijack the authentication of unspecified victims and submit arbitrary requests, such as exploiting the file upload vulnerability.

References

CVSS Scores

version 3.1