Directory traversal vulnerability in Pivotal Spring Framework 3.x before 3.2.9 and 4.0 before 4.0.5 allows remote attackers to read arbitrary files via a crafted URL.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://jvn.jp/en/jp/JVN49154900/index.html | vdb entry third party advisory |
http://rhn.redhat.com/errata/RHSA-2015-0720.html | third party advisory vendor advisory |
http://www.securityfocus.com/bid/68042 | vdb entry third party advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000054 | vdb entry third party advisory |
https://rhn.redhat.com/errata/RHSA-2015-0234.html | third party advisory vendor advisory |
https://rhn.redhat.com/errata/RHSA-2015-0235.html | third party advisory vendor advisory |
http://pivotal.io/security/cve-2014-3578 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1131882 | issue tracking third party advisory |
https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html | mailing list |