Spring Security Advisories

CVE-2014-3578 Directory Traversal in Spring Framework

MEDIUM | SEPTEMBER 05, 2014 | CVE-2014-3578

Description

Some URLs were not sanitized correctly before use allowing an attacker to obtain any file on the file system that was also accessible to process in which the Spring web application was running.

Affected Spring Products and Versions

  • 4.0.0 to 4.0.4
  • 3.2.0 to 3.2.8
  • 3.1.1 is known to be affected
  • Other unsupported versions may also be affected

Mitigation

Users of affected versions should apply the following mitigation:

  • Users of 3.x should upgrade to 3.2.9 or later
  • Users of 4.x should upgrade to 4.0.5 or later

Credit

This issue was identified by Takeshi Terada of Mitsui Bussan Secure Directions, Inc. and reported to Pivotal via JPCERT/CC. Information that additional versions were affected was discovered by Arun Babu Neelicattu of the RedHat Security Team.

History

  • 2014-Sep-05: Initial vulnerability report published.
  • 2014-Nov-26: Affected versions updated to add additional versions.

Get ahead

VMware offers training and certification to turbo-charge your progress.

Learn more

Get support

Tanzu Spring Runtime offers support and binaries for OpenJDK™, Spring, and Apache Tomcat® in one simple subscription.

Learn more

Upcoming events

Check out all the upcoming events in the Spring community.

View all