Description
Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1853-1 | libspring-java security update |
EUVD |
EUVD-2018-0652 | Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response. |
Github GHSA |
GHSA-pgf9-h69p-pcgf | Files or Directories Accessible to External Parties in org.springframework:spring-core |
Ubuntu USN |
USN-4774-1 | Spring Framework vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-08-06T06:41:08.706Z
Reserved: 2015-07-01T00:00:00.000Z
Link: CVE-2015-5211
No data.
Status : Modified
Published: 2017-05-25T17:29:00.443
Modified: 2026-05-13T00:24:29.033
Link: CVE-2015-5211
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Github GHSA
Ubuntu USN