Description
Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1853-1 | libspring-java security update |
EUVD |
EUVD-2018-0652 | Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response. |
Github GHSA |
GHSA-pgf9-h69p-pcgf | Files or Directories Accessible to External Parties in org.springframework:spring-core |
Ubuntu USN |
USN-4774-1 | Spring Framework vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-08-06T06:41:08.706Z
Reserved: 2015-07-01T00:00:00.000Z
Link: CVE-2015-5211
No data.
Status : Deferred
Published: 2017-05-25T17:29:00.443
Modified: 2025-04-20T01:37:25.860
Link: CVE-2015-5211
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Github GHSA
Ubuntu USN