Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1853-1 | libspring-java security update |
EUVD |
EUVD-2018-0652 | Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response. |
Github GHSA |
GHSA-pgf9-h69p-pcgf | Files or Directories Accessible to External Parties in org.springframework:spring-core |
Ubuntu USN |
USN-4774-1 | Spring Framework vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-08-06T06:41:08.706Z
Reserved: 2015-07-01T00:00:00.000Z
Link: CVE-2015-5211
No data.
Status : Deferred
Published: 2017-05-25T17:29:00.443
Modified: 2025-04-20T01:37:25.860
Link: CVE-2015-5211
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Github GHSA
Ubuntu USN