Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-5211

Опубликовано: 25 мая 2017
Источник: debian
EPSS Низкий

Описание

Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libspring-javafixed4.1.9-1package
libspring-javano-dsawheezypackage

Примечания

  • https://jira.spring.io/browse/SPR-13548

  • https://github.com/spring-projects/spring-framework/commit/2bd1da

  • https://github.com/spring-projects/spring-framework/commit/a95c3d

  • https://github.com/spring-projects/spring-framework/commit/03f547

  • https://pivotal.io/security/cve-2015-5211

EPSS

Процентиль: 84%
0.02321
Низкий

Связанные уязвимости

CVSS3: 9.6
ubuntu
около 8 лет назад

Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response.

CVSS3: 9.6
nvd
около 8 лет назад

Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response.

CVSS3: 8.6
github
больше 6 лет назад

Files or Directories Accessible to External Parties in org.springframework:spring-core

EPSS

Процентиль: 84%
0.02321
Низкий