First published: Wed Aug 20 2014(Updated: )
Directory traversal vulnerability in Pivotal Spring Framework 3.x before 3.2.9 and 4.0 before 4.0.5 allows remote attackers to read arbitrary files via a crafted URL.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.springframework:spring-core | >=4.0.0<4.0.5 | 4.0.5 |
maven/org.springframework:spring-core | >=3.0.0<3.2.9 | 3.2.9 |
redhat/spring | <3.2.0 | 3.2.0 |
Spring Framework | >=3.2.0<3.2.9 | |
Spring Framework | >=4.0.0<4.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3578 is classified as a medium severity vulnerability due to its potential impact on sensitive file exposure.
To fix CVE-2014-3578, upgrade the Spring Framework to version 3.2.9 or later, or 4.0.5 or later.
The affected versions of Spring Framework are versions before 3.2.9 and before 4.0.5.
CVE-2014-3578 allows remote attackers to exploit a directory traversal vulnerability to read arbitrary files.
As of now, there are no known public exploit details available for CVE-2014-3578.