First published: Thu May 25 2017(Updated: )
Pivotal Spring Framework could allow a remote attacker to download arbitrary files, caused by a reflected file download attack. By using a specially crafted URL with a batch script extension, an attacker could exploit this vulnerability to download a malicious response.
Credit: security_alert@emc.com security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Directory Suite VA | <=8.0.1-8.0.1.19 | |
VMware Spring Framework | =3.2.0 | |
VMware Spring Framework | =3.2.1 | |
VMware Spring Framework | =3.2.2 | |
VMware Spring Framework | =3.2.3 | |
VMware Spring Framework | =3.2.4 | |
VMware Spring Framework | =3.2.5 | |
VMware Spring Framework | =3.2.6 | |
VMware Spring Framework | =3.2.7 | |
VMware Spring Framework | =3.2.8 | |
VMware Spring Framework | =3.2.9 | |
VMware Spring Framework | =3.2.10 | |
VMware Spring Framework | =3.2.11 | |
VMware Spring Framework | =3.2.12 | |
VMware Spring Framework | =3.2.13 | |
VMware Spring Framework | =3.2.14 | |
VMware Spring Framework | =4.0.0 | |
VMware Spring Framework | =4.0.1 | |
VMware Spring Framework | =4.0.2 | |
VMware Spring Framework | =4.0.3 | |
VMware Spring Framework | =4.0.4 | |
VMware Spring Framework | =4.0.5 | |
VMware Spring Framework | =4.0.6 | |
VMware Spring Framework | =4.0.7 | |
VMware Spring Framework | =4.0.8 | |
VMware Spring Framework | =4.0.9 | |
VMware Spring Framework | =4.1.0 | |
VMware Spring Framework | =4.1.1 | |
VMware Spring Framework | =4.1.2 | |
VMware Spring Framework | =4.1.3 | |
VMware Spring Framework | =4.1.4 | |
VMware Spring Framework | =4.1.5 | |
VMware Spring Framework | =4.1.6 | |
VMware Spring Framework | =4.1.7 | |
VMware Spring Framework | =4.2.0 | |
VMware Spring Framework | =4.2.1 | |
Debian Debian Linux | =8.0 | |
maven/org.springframework:spring-core | <3.2.15 | 3.2.15 |
maven/org.springframework:spring-core | >=4.2.0<4.2.2 | 4.2.2 |
maven/org.springframework:spring-core | >=4.0.0<4.1.8 | 4.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2015-5211.
CVE-2015-5211 has a severity rating of 9.6 (Critical).
The Spring Framework versions 3.2.0 to 3.2.14, 4.0.0 to 4.1.7, and 4.2.0 to 4.2.1 are affected.
An attacker can exploit CVE-2015-5211 by crafting a URL with a malicious batch script extension, resulting in the download of arbitrary files.
Yes, you can find more information about CVE-2015-5211 at these references: 1. [IBM X-Force Exchange](https://exchange.xforce.ibmcloud.com/vulnerabilities/130673) 2. [IBM Support](https://www.ibm.com/support/pages/node/7001693) 3. [Debian LTS Announce](https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html)