VMware SpringSource Grails before 1.3.8, and 2.x before 2.0.2, does not properly restrict data binding, which might allow remote attackers to bypass intended access restrictions and modify arbitrary object properties via a crafted request parameter to an application.
                
            References
                    | Link | Resource | 
|---|---|
| http://secunia.com/advisories/51113 | |
| http://support.springsource.com/security/cve-2012-1833 | Exploit Patch Vendor Advisory | 
| http://www.securityfocus.com/bid/55763 | |
| http://secunia.com/advisories/51113 | |
| http://support.springsource.com/security/cve-2012-1833 | Exploit Patch Vendor Advisory | 
| http://www.securityfocus.com/bid/55763 | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 01:37
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://secunia.com/advisories/51113 - | |
| References | () http://support.springsource.com/security/cve-2012-1833 - Exploit, Patch, Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/55763 - | 
Information
                Published : 2012-09-28 21:55
Updated : 2025-04-11 00:51
NVD link : CVE-2012-1833
Mitre link : CVE-2012-1833
CVE.ORG link : CVE-2012-1833
JSON object : View
Products Affected
                springsource
- grails
CWE
                
                    
                        
                        CWE-264
                        
            Permissions, Privileges, and Access Controls
