First published: Tue Dec 10 2013(Updated: )
It was found that the org.spring.web.util.JavaScriptUtils.javaScriptEscape method insufficiently escaped some characters. Applications using this method to escape user-supplied content that will be rendered in HTML 5 documents may expose cross-site scripting (XSS) flaws.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.springframework:spring-web | >=3.0.0.RELEASE<=3.2.1.RELEASE | 3.2.2.RELEASE |
Spring Framework | >=3.0.0<3.2.2 |
https://github.com/spring-projects/spring-framework/commit/7a7df6637478607bef0277bf52a4e0a03e20a248
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6430 is considered a high severity vulnerability due to its potential for cross-site scripting (XSS) attacks.
To fix CVE-2013-6430, upgrade to Spring Framework version 3.2.2.RELEASE or later.
CVE-2013-6430 affects applications using org.springframework:spring-web versions between 3.0.0.RELEASE and 3.2.1.RELEASE.
CVE-2013-6430 is a cross-site scripting (XSS) vulnerability.
No, CVE-2013-6430 is not present in the latest releases beyond version 3.2.1.RELEASE.