Описание
SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.
Комментарий
The previous CVSS assessment 5.1 (AV:N/AC:M/Au:N/C:P/I:P/A:P) was provided at the time of initial analysis based on the best available published information at that time. The score has be updated to reflect the impact to Oracle products per <a href=http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html> Oracle Critical Patch Update Advisory - October 2015 . Other products listed as vulnerable may or may not be similarly impacted.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Exploit
- Exploit
- ExploitVendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Одно из
Одно из
EPSS
6 Medium
CVSS2
Дефекты
Связанные уязвимости
SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.
SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2 ...
Improper Control of Generation of Code ('Code Injection') in Spring Framework
Уязвимость программной платформы Spring Framework, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код
EPSS
6 Medium
CVSS2