Логотип exploitDog
product: "spring_framework"
Консоль
Логотип exploitDog

exploitDog

product: "spring_framework"
Spring Framework

Spring Frameworkуниверсальный фреймворк с открытым исходным кодом для Java-платформы.

Релизный цикл, информация об уязвимостях

Продукт: Spring Framework
Вендор: VMware

График релизов

6.16.220232024202520262027

Недавние уязвимости Spring Framework

Количество 241

nvd логотип

CVE-2018-15756

больше 6 лет назад

Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2018-15756

больше 6 лет назад

Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, version ...

CVSS3: 7.5
EPSS: Средний
ubuntu логотип

CVE-2018-15756

больше 6 лет назад

Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-8crv-49fr-2h6j

больше 6 лет назад

Spring Security and Spring Framework may not recognize certain paths that should be protected

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-pgf9-h69p-pcgf

больше 6 лет назад

Files or Directories Accessible to External Parties in org.springframework:spring-core

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-6v7w-535j-rq5m

больше 6 лет назад

Pivotal Spring Framework DoS Attack with XML Input

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-45vg-2v73-vm62

больше 6 лет назад

Moderate severity vulnerability that affects org.springframework:spring-core

EPSS: Низкий
github логотип

GHSA-3rmv-2pg5-xvqj

больше 6 лет назад

Spring Framework has Improperly Implemented Security Check for Standard

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-4487-x383-qpph

больше 6 лет назад

Possible privilege escalation in org.springframework:spring-core

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-g8hw-794c-4j9g

больше 6 лет назад

Path Traversal in org.springframework:spring-core

CVSS3: 5.9
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
nvd логотип
CVE-2018-15756

Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.

CVSS3: 7.5
14%
Средний
больше 6 лет назад
debian логотип
CVE-2018-15756

Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, version ...

CVSS3: 7.5
14%
Средний
больше 6 лет назад
ubuntu логотип
CVE-2018-15756

Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.

CVSS3: 7.5
14%
Средний
больше 6 лет назад
github логотип
GHSA-8crv-49fr-2h6j

Spring Security and Spring Framework may not recognize certain paths that should be protected

CVSS3: 7.5
0%
Низкий
больше 6 лет назад
github логотип
GHSA-pgf9-h69p-pcgf

Files or Directories Accessible to External Parties in org.springframework:spring-core

CVSS3: 8.6
2%
Низкий
больше 6 лет назад
github логотип
GHSA-6v7w-535j-rq5m

Pivotal Spring Framework DoS Attack with XML Input

CVSS3: 5.5
1%
Низкий
больше 6 лет назад
github логотип
GHSA-45vg-2v73-vm62

Moderate severity vulnerability that affects org.springframework:spring-core

0%
Низкий
больше 6 лет назад
github логотип
GHSA-3rmv-2pg5-xvqj

Spring Framework has Improperly Implemented Security Check for Standard

CVSS3: 9.8
32%
Средний
больше 6 лет назад
github логотип
GHSA-4487-x383-qpph

Possible privilege escalation in org.springframework:spring-core

CVSS3: 7.5
2%
Низкий
больше 6 лет назад
github логотип
GHSA-g8hw-794c-4j9g

Path Traversal in org.springframework:spring-core

CVSS3: 5.9
92%
Критический
больше 6 лет назад

Уязвимостей на страницу


Поделиться