First published: Wed Dec 05 2012(Updated: )
Spring Framework could allow a remote attacker to obtain sensitive information, caused by an error when handling the Expression Language. An attacker could exploit this vulnerability to obtain classpaths and other sensitive information.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SpringSource Spring Framework | =2.5.0 | |
SpringSource Spring Framework | =3.0.1 | |
SpringSource Spring Framework | =2.5.3 | |
SpringSource Spring Framework | =3.0.2 | |
SpringSource Spring Framework | =2.5.5 | |
SpringSource Spring Framework | =2.5.6 | |
SpringSource Spring Framework | <=2.5.7_sr01 | |
SpringSource Spring Framework | =2.5.0-rc1 | |
SpringSource Spring Framework | =3.0.4 | |
SpringSource Spring Framework | =2.5.4 | |
SpringSource Spring Framework | =2.5.0-rc2 | |
SpringSource Spring Framework | <=3.0.5 | |
SpringSource Spring Framework | =3.0.3 | |
SpringSource Spring Framework | =2.5.2 | |
SpringSource Spring Framework | =2.5.7 | |
SpringSource Spring Framework | =3.0.0 | |
SpringSource Spring Framework | =2.5.1 | |
IBM Security Directory Suite VA | <=8.0.1-8.0.1.19 | |
maven/org.springframework:spring-core | >=2.5.7.SR0<=2.5.7.SR022 | 2.5.7.SR023 |
maven/org.springframework:spring-core | <=2.5.6.SEC02 | 2.5.6.SEC03 |
maven/org.springframework:spring-core | >=3.0.0<3.0.6 | 3.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2011-2730.
The severity of CVE-2011-2730 is high with a CVSS score of 7.5.
The affected software versions are SpringSource Spring Framework 2.5.0, 3.0.1, 2.5.3, 3.0.2, 2.5.5, 2.5.6, and up to 2.5.7_sr01.
A remote attacker can exploit this vulnerability by evaluating Expression Language (EL) expressions in tags twice.
Yes, you can refer to the following links: [1](https://docs.google.com/document/d/1dc1xxO8UMFaGLOwgkykYdghGWm_2Gn0iCrxFsympqcE/edit), [2](http://www.debian.org/security/2012/dsa-2504), [3](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677814).