Логотип exploitDog
bind:CVE-2025-41234
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-41234

Количество 6

Количество 6

ubuntu логотип

CVE-2025-41234

6 месяцев назад

Description In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input. Specifically, an application is vulnerable when all the following are true: * The header is prepared with org.springframework.http.ContentDisposition. * The filename is set via ContentDisposition.Builder#filename(String, Charset). * The value for the filename is derived from user-supplied input. * The application does not sanitize the user-supplied input. * The downloaded content of the response is injected with malicious commands by the attacker (see RFD paper reference for details). An application is not vulnerable if any of the following is true: * The application does not set a “Content-Disposition” response header. * The header is not prepared with org.springframework.http.C...

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2025-41234

6 месяцев назад

Description In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input. Specifically, an application is vulnerable when all the following are true: * The header is prepared with org.springframework.http.ContentDisposition. * The filename is set via ContentDisposition.Builder#filename(String, Charset). * The value for the filename is derived from user-supplied input. * The application does not sanitize the user-supplied input. * The downloaded content of the response is injected with malicious commands by the attacker (see RFD paper reference for details). An application is not vulnerable if any of the following is true: * The application does not set a “Content-Disposition” response header. * The header is not prepared with org.springframework.http.C...

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2025-41234

6 месяцев назад

Description In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input. Specifically, an application is vulnerable when all the following are true: * The header is prepared with org.springframework.http.ContentDisposition. * The filename is set via ContentDisposition.Builder#filename(String, Charset). * The value for the filename is derived from user-supplied input. * The application does not sanitize the user-supplied input. * The downloaded content of the response is injected with malicious commands by the attacker (see RFD paper reference for details). An application is not vulnerable if any of the following is true: * The application does not set a “Content-Disposition” response header. * The header is not prepared with org.sprin

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2025-41234

6 месяцев назад

Description In Spring Framework, versions 6.0.x as of 6.0.5, versions ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-6r3c-xf4w-jxjm

6 месяцев назад

Spring Framework vulnerable to a reflected file download (RFD)

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2025-10350

6 месяцев назад

Уязвимость фреймворка Spring Framework, связанная с непринятием мер по обработке последовательностей CRLF в заголовках HTTP Headers (или \"Расщепление ответа HTTP\"), позволяющая нарушителю провести атаку RFD

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-41234

Description In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input. Specifically, an application is vulnerable when all the following are true: * The header is prepared with org.springframework.http.ContentDisposition. * The filename is set via ContentDisposition.Builder#filename(String, Charset). * The value for the filename is derived from user-supplied input. * The application does not sanitize the user-supplied input. * The downloaded content of the response is injected with malicious commands by the attacker (see RFD paper reference for details). An application is not vulnerable if any of the following is true: * The application does not set a “Content-Disposition” response header. * The header is not prepared with org.springframework.http.C...

CVSS3: 6.5
0%
Низкий
6 месяцев назад
redhat логотип
CVE-2025-41234

Description In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input. Specifically, an application is vulnerable when all the following are true: * The header is prepared with org.springframework.http.ContentDisposition. * The filename is set via ContentDisposition.Builder#filename(String, Charset). * The value for the filename is derived from user-supplied input. * The application does not sanitize the user-supplied input. * The downloaded content of the response is injected with malicious commands by the attacker (see RFD paper reference for details). An application is not vulnerable if any of the following is true: * The application does not set a “Content-Disposition” response header. * The header is not prepared with org.springframework.http.C...

CVSS3: 6.5
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-41234

Description In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input. Specifically, an application is vulnerable when all the following are true: * The header is prepared with org.springframework.http.ContentDisposition. * The filename is set via ContentDisposition.Builder#filename(String, Charset). * The value for the filename is derived from user-supplied input. * The application does not sanitize the user-supplied input. * The downloaded content of the response is injected with malicious commands by the attacker (see RFD paper reference for details). An application is not vulnerable if any of the following is true: * The application does not set a “Content-Disposition” response header. * The header is not prepared with org.sprin

CVSS3: 6.5
0%
Низкий
6 месяцев назад
debian логотип
CVE-2025-41234

Description In Spring Framework, versions 6.0.x as of 6.0.5, versions ...

CVSS3: 6.5
0%
Низкий
6 месяцев назад
github логотип
GHSA-6r3c-xf4w-jxjm

Spring Framework vulnerable to a reflected file download (RFD)

CVSS3: 6.5
0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-10350

Уязвимость фреймворка Spring Framework, связанная с непринятием мер по обработке последовательностей CRLF в заголовках HTTP Headers (или \"Расщепление ответа HTTP\"), позволяющая нарушителю провести атаку RFD

CVSS3: 6.5
0%
Низкий
6 месяцев назад

Уязвимостей на страницу