Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.

Project Subscriptions

Vendors Products
Application Testing Suite Subscribe
Big Data Discovery Subscribe
Communications Converged Application Server Subscribe
Communications Diameter Signaling Router Subscribe
Communications Performance Intelligence Center Subscribe
Communications Policy Management Subscribe
Communications Services Gatekeeper Subscribe
Enterprise Manager Ops Center Subscribe
Goldengate For Big Data Subscribe
Health Sciences Information Manager Subscribe
Healthcare Master Person Index Subscribe
Insurance Calculation Engine Subscribe
Insurance Rules Palette Subscribe
Primavera Gateway Subscribe
Rapid Planning Subscribe
Retail Back Office Subscribe
Retail Central Office Subscribe
Retail Customer Insights Subscribe
Retail Integration Bus Subscribe
Retail Open Commerce Platform Subscribe
Retail Order Broker Subscribe
Retail Point-of-sale Subscribe
Retail Predictive Application Server Subscribe
Retail Returns Management Subscribe
Retail Xstore Point Of Service Subscribe
Service Architecture Leveraging Tuxedo Subscribe
Tape Library Acsls Subscribe
Jboss Fuse Subscribe
Openshift Application Runtimes Subscribe
Spring Framework Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-g8hw-794c-4j9g Path Traversal in org.springframework:spring-core
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2024-09-16T23:16:43.841Z

Reserved: 2017-12-06T00:00:00

Link: CVE-2018-1271

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-04-06T13:29:00.500

Modified: 2024-11-21T03:59:30.683

Link: CVE-2018-1271

cve-icon Redhat

Severity : Moderate

Publid Date: 2018-04-05T00:00:00Z

Links: CVE-2018-1271 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses