Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-41234

Опубликовано: 12 июн. 2025
Источник: nvd
CVSS3: 6.5
EPSS Низкий

Описание

Description

In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input.

Specifically, an application is vulnerable when all the following are true:

  • The header is prepared with org.springframework.http.ContentDisposition.
  • The filename is set via ContentDisposition.Builder#filename(String, Charset).
  • The value for the filename is derived from user-supplied input.
  • The application does not sanitize the user-supplied input.
  • The downloaded content of the response is injected with malicious commands by the attacker (see RFD paper reference for details).

An application is not vulnerable if any of the following is true:

  • The application does not set a “Content-Disposition” response header.
  • The header is not prepared with org.sprin

EPSS

Процентиль: 47%
0.0024
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-113

Связанные уязвимости

CVSS3: 6.5
ubuntu
10 месяцев назад

Description In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input. Specifically, an application is vulnerable when all the following are true: * The header is prepared with org.springframework.http.ContentDisposition. * The filename is set via ContentDisposition.Builder#filename(String, Charset). * The value for the filename is derived from user-supplied input. * The application does not sanitize the user-supplied input. * The downloaded content of the response is injected with malicious commands by the attacker (see RFD paper reference for details). An application is not vulnerable if any of the following is true: * The application does not set a “Content-Disposition” response header. * The header is not prepared with org.springframework.http.C...

CVSS3: 6.5
redhat
10 месяцев назад

Description In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input. Specifically, an application is vulnerable when all the following are true: * The header is prepared with org.springframework.http.ContentDisposition. * The filename is set via ContentDisposition.Builder#filename(String, Charset). * The value for the filename is derived from user-supplied input. * The application does not sanitize the user-supplied input. * The downloaded content of the response is injected with malicious commands by the attacker (see RFD paper reference for details). An application is not vulnerable if any of the following is true: * The application does not set a “Content-Disposition” response header. * The header is not prepared with org.springframework.http.C...

CVSS3: 6.5
debian
10 месяцев назад

Description In Spring Framework, versions 6.0.x as of 6.0.5, versions ...

CVSS3: 6.5
github
10 месяцев назад

Spring Framework vulnerable to a reflected file download (RFD)

CVSS3: 6.5
fstec
10 месяцев назад

Уязвимость фреймворка Spring Framework, связанная с непринятием мер по обработке последовательностей CRLF в заголовках HTTP Headers (или \"Расщепление ответа HTTP\"), позволяющая нарушителю провести атаку RFD

EPSS

Процентиль: 47%
0.0024
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-113