Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1853-1 libspring-java security update
EUVD EUVD EUVD-2018-0652 Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response.
Github GHSA Github GHSA GHSA-pgf9-h69p-pcgf Files or Directories Accessible to External Parties in org.springframework:spring-core
Ubuntu USN Ubuntu USN USN-4774-1 Spring Framework vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2024-08-06T06:41:08.706Z

Reserved: 2015-07-01T00:00:00

Link: CVE-2015-5211

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-05-25T17:29:00.443

Modified: 2025-04-20T01:37:25.860

Link: CVE-2015-5211

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.