Description
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
Published: 2020-09-19
Score: 6.5 Medium
EPSS: 63.8% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rv39-3qh7-9v7w Improper Input Validation in Spring Framework
References
Link Providers
https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163%40%3Ccommits.ambari.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a%40%3Cissues.ambari.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r3589ed0d18edeb79028615080d5a0e8878856436bb91774a3196d9eb%40%3Ccommits.pulsar.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r503e64b43a57fd68229cac4a869d1a9a2eac9e75f8719cad3a840211%40%3Ccommits.pulsar.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5%40%3Cissues.ambari.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r7e6a213eea7f04fc6d9e3bd6eb8d68c4df92a22e956e95cb2c482865%40%3Cissues.hive.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a%40%3Cdev.ambari.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r918caad55dcc640a16753b00d8d6acb90b4e36de4b6156d0867246ec%40%3Ccommits.pulsar.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1%40%3Cdev.ambari.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/ra889d95141059c6cbe77dd80249bb488ae53b274b5f3abad09d9511d%40%3Cuser.ignite.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/raf7ca57033e537e4f9d7df7f192fa6968c1e49409b2348e08d807ccb%40%3Cuser.ignite.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rb18ed999153ef0f0cb7af03efe0046c42c7242fd77fbd884a75ecfdc%40%3Ccommits.pulsar.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rc9efaf6db98bee19db1bc911d0fa442287dac5cb229d4aaa08b6a13d%40%3Cissues.hive.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rd462a8b0dfab4c15e67c0672cd3c211ecd0e4f018f824082ed54f665%40%3Cissues.hive.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/re014a49d77f038ba70e5e9934d400af6653e8c9ac110d32b1254127e%40%3Cdev.ranger.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf00d8f4101a1c1ea4de6ea1e09ddf7472cfd306745c90d6da87ae074%40%3Cdev.hive.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2020-5421 cve-icon
https://security.netapp.com/advisory/ntap-20210513-0009/ cve-icon cve-icon
https://tanzu.vmware.com/security/cve-2020-5421 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2020-5421 cve-icon
https://www.oracle.com//security-alerts/cpujul2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuApr2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2021.html cve-icon cve-icon
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.6708}

epss

{'score': 0.59873}


Subscriptions

Netapp Oncommand Insight Snap Creator Framework Snapcenter
Oracle Commerce Guided Search Communications Brm Communications Design Studio Communications Session Report Manager Communications Unified Inventory Management Endeca Information Discovery Integrator Enterprise Data Quality Financial Services Analytical Applications Infrastructure Flexcube Private Banking Fusion Middleware Goldengate Application Adapters Healthcare Master Person Index Hyperion Infrastructure Technology Insurance Policy Administration Insurance Rules Palette Mysql Enterprise Monitor Primavera Gateway Primavera P6 Enterprise Project Portfolio Management Retail Assortment Planning Retail Bulk Data Integration Retail Customer Engagement Retail Customer Management And Segmentation Foundation Retail Financial Integration Retail Integration Bus Retail Invoice Matching Retail Merchandising System Retail Order Broker Retail Predictive Application Server Retail Returns Management Retail Service Backbone Retail Xstore Point Of Service Storagetek Acsls Storagetek Tape Analytics Sw Tool Weblogic Server
Redhat Jboss Fuse
Vmware Spring Framework
cve-icon MITRE

Status: PUBLISHED

Assigner: pivotal

Published:

Updated: 2024-09-17T03:58:43.873Z

Reserved: 2020-01-03T00:00:00.000Z

Link: CVE-2020-5421

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-19T04:15:11.527

Modified: 2024-11-21T05:34:08.303

Link: CVE-2020-5421

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-09-17T00:00:00Z

Links: CVE-2020-5421 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses