First published: Wed Mar 12 2014(Updated: )
A cross-site scripting flaw was found in the Spring Framework when using Spring MVC. From the original advisory: "When a programmer does not specify the action on the Spring form, Spring automatically populates the action field with the requested uri. An attacker can use this to inject malicious content into the form." This issue affects versions 3.0.0 to 3.2.7*, and versions 4.0.0 to 4.0.1. (the fix is present in version 3.2.8; this was incorrect in the gopivotal flaw - chazlett) External References: <a href="http://www.gopivotal.com/security/cve-2014-1904">http://www.gopivotal.com/security/cve-2014-1904</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/spring mvc | <3.2.8 | 3.2.8 |
redhat/spring mvc | <4.0.2 | 4.0.2 |
Pivotal Software Spring Framework | >=3.0.0<3.2.8 | |
Pivotal Software Spring Framework | >=4.0.0<4.0.2 | |
maven/org.springframework:spring-webmvc | >=4.0.0<=4.0.1.RELEASE | 4.0.2.RELEASE |
maven/org.springframework:spring-webmvc | >=3.0.0<=3.2.7.RELEASE | 3.2.8.RELEASE |
https://github.com/spring-projects/spring-framework/commit/741b4b229ae032bd17175b46f98673ce0bd2d485
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.