Cross-site scripting (XSS) vulnerability in web/servlet/tags/form/FormTag.java in Spring MVC in Spring Framework 3.0.0 before 3.2.8 and 4.0.0 before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the requested URI in a default action.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.gopivotal.com/security/cve-2014-1904 | patch vendor advisory |
http://www.securityfocus.com/bid/66137 | vdb entry third party advisory |
https://jira.springsource.org/browse/SPR-11426 | permissions required |
https://github.com/spring-projects/spring-framework/commit/741b4b229ae032bd17175b46f98673ce0bd2d485 | third party advisory patch |
http://www.securityfocus.com/archive/1/531422/100/0/threaded | mailing list broken link |
http://rhn.redhat.com/errata/RHSA-2014-0400.html | third party advisory vendor advisory |
http://secunia.com/advisories/57915 | third party advisory permissions required |
http://docs.spring.io/spring/docs/3.2.8.RELEASE/changelog.txt | vendor advisory |
http://seclists.org/fulldisclosure/2014/Mar/101 | third party advisory mailing list |