First published: Tue Dec 10 2013(Updated: )
It was found that the org.spring.web.util.JavaScriptUtils.javaScriptEscape method insufficiently escaped some characters. Applications using this method to escape user-supplied content that will be rendered in HTML 5 documents may expose cross-site scripting (XSS) flaws.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Software Spring Framework | >=3.0.0<3.2.2 | |
maven/org.springframework:spring-web | >=3.0.0.RELEASE<=3.2.1.RELEASE | 3.2.2.RELEASE |
https://github.com/spring-projects/spring-framework/commit/7a7df6637478607bef0277bf52a4e0a03e20a248
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.