You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.
Fix Resolution: Users of affected versions should apply the following mitigation:
5.0.x users should upgrade to 5.0.5
4.3.x users should upgrade to 4.3.15
Older versions should upgrade to a supported branch
There are no other mitigation steps necessary.
Note also that this attack does not apply to applications that:
Do not use Windows.
Do not serve files from the file system, i.e. not using “file:” for the resource location.
Use Spring Security with versions patched for .
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered:
CVE-2018-1271 - Medium Severity Vulnerability
Vulnerable Library - spring-webmvc-4.3.2.RELEASE.jar
Spring Web MVC
path: /root/.m2/repository/org/springframework/spring-webmvc/4.3.2.RELEASE/spring-webmvc-4.3.2.RELEASE.jar
Library home page: https://github.com/spring-projects/spring-framework
Dependency Hierarchy:
Vulnerability Details
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.
Publish Date: 2018-04-06
URL: CVE-2018-1271
CVSS 3 Score Details (5.9)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://pivotal.io/security/cve-2018-1271
Fix Resolution: Users of affected versions should apply the following mitigation: 5.0.x users should upgrade to 5.0.5 4.3.x users should upgrade to 4.3.15 Older versions should upgrade to a supported branch There are no other mitigation steps necessary. Note also that this attack does not apply to applications that: Do not use Windows. Do not serve files from the file system, i.e. not using “file:” for the resource location. Use Spring Security with versions patched for .
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: