Cross-Site Request Forgery (CSRF) Affecting org.springframework.batch:spring-batch-admin package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.12% (47th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-Site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGSPRINGFRAMEWORKBATCH-32145
  • published1 Apr 2018
  • disclosed21 Mar 2018
  • creditUnknown

Introduced: 21 Mar 2018

CVE-2018-1230  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

There is no fixed version for org.springframework.batch:spring-batch-admin.

Overview

org.springframework.batch:spring-batch-admin is a deprecated web application and API for managing and monitoring Spring Batch jobs

Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF). Affected version of this package are vulnerable to Cross-Site Request Forgery (CSRF). A remote unauthenticated user could craft a malicious site that executes requests to Spring Batch Admin. This issue has not been patched because Spring Batch Admin has reached end of life.

NOTE: Spring Batch Admin has reached end of life as of January 1, 2018. According to the vendor, Spring Cloud Data Flow is the recommended replacement for managing and monitoring Spring Batch jobs going forward.

CVSS Scores

version 3.1