CVE-2016-9878
Published: 29 December 2016
An issue was discovered in Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x before 4.3.5. Paths provided to the ResourceServlet were not properly sanitized and as a result exposed to directory traversal attacks.
From the Ubuntu Security Team
It was discovered that Spring Framework incorrectly handled path inputs. An attacker could possibly use this issue to read arbitrary files.
Priority
Status
Package | Release | Status |
---|---|---|
libspring-java Launchpad, Ubuntu, Debian |
artful |
Ignored
(end of life)
|
bionic |
Not vulnerable
(4.3.5-1)
|
|
cosmic |
Not vulnerable
(4.3.5-1)
|
|
disco |
Not vulnerable
(4.3.5-1)
|
|
eoan |
Not vulnerable
(4.3.5-1)
|
|
focal |
Not vulnerable
(4.3.5-1)
|
|
groovy |
Not vulnerable
(4.3.5-1)
|
|
impish |
Not vulnerable
(4.3.5-1)
|
|
jammy |
Not vulnerable
(4.3.5-1)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Released
(3.0.6.RELEASE-13ubuntu0.1~esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
upstream |
Released
(4.3.5-1)
|
|
xenial |
Released
(3.2.13-5ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Ignored
(end of life)
|
|
hirsute |
Not vulnerable
(4.3.5-1)
|
|
Patches: other: https://github.com/spring-projects/spring-framework/commit/e2d6e709c3c65a4951eb096843ee75d5200cfcad (4.3.x branch) other: https://github.com/spring-projects/spring-framework/commit/43bf008fbcd0d7945e2fcd5e30039bc4d74c7a98 (4.2.x branch) other: https://github.com/spring-projects/spring-framework/commit/a7dc48534ea501525f11369d369178a60c2f47d0 (3.2.x branch) |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |