First published: Tue Mar 10 2015(Updated: )
The Java SockJS client in Pivotal Spring Framework 4.1.x before 4.1.5 generates predictable session ids, which allows remote attackers to send messages to other sessions via unspecified vectors.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.springframework:spring-core | >=4.1.0<4.1.5 | 4.1.5 |
VMware Spring Framework | =4.1.0 | |
VMware Spring Framework | =4.1.1 | |
VMware Spring Framework | =4.1.2 | |
VMware Spring Framework | =4.1.3 | |
VMware Spring Framework | =4.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0201 has been classified as a high severity vulnerability due to its potential exploitation by remote attackers.
To fix CVE-2015-0201, upgrade your Spring Framework to version 4.1.5 or later.
CVE-2015-0201 allows remote attackers to send messages to other sessions by exploiting predictable session IDs.
CVE-2015-0201 affects Spring Framework versions 4.1.0 to 4.1.4.
CVE-2015-0201 specifically impacts the Java SockJS client in the Spring Framework, which includes Spring Core.