CVE-2014-3625 Directory Traversal in Spring Framework
Severity
Moderate
Vendor
Spring by Pivotal
Versions Affected
- Spring Framework 3.0.4 to 3.2.11
- Spring Framework 4.0.0 to 4.0.7
- Spring Framework 4.1.0 to 4.1.1
- Other unsupported versions may also be affected
Description
Some URLs were not santized correctly before use allowing an attacker to obtain any file on the file system that was also accessible to process in which the Spring web application was running.
Mitigation
Users of affected versions should apply the following mitigation:
- Users of 3.2.x should upgrade to 3.2.12 or later
- Users of 4.0.x should upgrade to 4.0.8 or later
- Users of 4.1.x should upgrade to 4.1.2 or later
Credit
This issue was identified by Toshiaki Maki of NTT DATA Corporation and responsibly reported to Pivotal.
References
- https://jira.spring.io/browse/SPR-12354
- https://github.com/spring-projects/spring-framework/commit/9beae9ae4226c45cd428035dae81214439324676
- https://github.com/spring-projects/spring-framework/commit/9cef8e3001ddd61c734281a7556efd84b6cc2755
- https://github.com/spring-projects/spring-framework/commit/3f68cd633f03370d33c2603a6496e81273782601
History
2014-Nov-11: Initial vulnerability report published.