Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-41234

Опубликовано: 12 июн. 2025
Источник: nvd
CVSS3: 6.5
EPSS Низкий

Описание

Description

In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input.

Specifically, an application is vulnerable when all the following are true:

  • The header is prepared with org.springframework.http.ContentDisposition.
  • The filename is set via ContentDisposition.Builder#filename(String, Charset).
  • The value for the filename is derived from user-supplied input.
  • The application does not sanitize the user-supplied input.
  • The downloaded content of the response is injected with malicious commands by the attacker (see RFD paper reference for details).

An application is not vulnerable if any of the following is true:

  • The application does not set a “Content-Disposition” response header.
  • The header is not prepared with org.sprin

EPSS

Процентиль: 29%
0.00106
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-113

Связанные уязвимости

CVSS3: 6.5
ubuntu
6 месяцев назад

Description In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input. Specifically, an application is vulnerable when all the following are true: * The header is prepared with org.springframework.http.ContentDisposition. * The filename is set via ContentDisposition.Builder#filename(String, Charset). * The value for the filename is derived from user-supplied input. * The application does not sanitize the user-supplied input. * The downloaded content of the response is injected with malicious commands by the attacker (see RFD paper reference for details). An application is not vulnerable if any of the following is true: * The application does not set a “Content-Disposition” response header. * The header is not prepared with org.springframework.http.C...

CVSS3: 6.5
redhat
6 месяцев назад

Description In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input. Specifically, an application is vulnerable when all the following are true: * The header is prepared with org.springframework.http.ContentDisposition. * The filename is set via ContentDisposition.Builder#filename(String, Charset). * The value for the filename is derived from user-supplied input. * The application does not sanitize the user-supplied input. * The downloaded content of the response is injected with malicious commands by the attacker (see RFD paper reference for details). An application is not vulnerable if any of the following is true: * The application does not set a “Content-Disposition” response header. * The header is not prepared with org.springframework.http.C...

CVSS3: 6.5
debian
6 месяцев назад

Description In Spring Framework, versions 6.0.x as of 6.0.5, versions ...

CVSS3: 6.5
github
6 месяцев назад

Spring Framework vulnerable to a reflected file download (RFD)

CVSS3: 6.5
fstec
6 месяцев назад

Уязвимость фреймворка Spring Framework, связанная с непринятием мер по обработке последовательностей CRLF в заголовках HTTP Headers (или \"Расщепление ответа HTTP\"), позволяющая нарушителю провести атаку RFD

EPSS

Процентиль: 29%
0.00106
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-113