Описание
In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.
Ссылки
Уязвимые конфигурации
Одно из
Одно из
Одно из
EPSS
8 High
CVSS3
7.5 High
CVSS3
7.6 High
CVSS2
Дефекты
Связанные уязвимости
In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.
In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.
In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x pri ...
RFD attack via Content-Disposition header sourced from request input by Spring MVC or Spring WebFlux Application
Уязвимость компонента Spring Framework программного продукта Oracle Retail Order Broker, позволяющая нарушителю получить полный контроль над приложением
EPSS
8 High
CVSS3
7.5 High
CVSS3
7.6 High
CVSS2