Affected configuration(s):
cpe:/a:pivotal_software:spring_framework:3.0.0
cpe:/a:pivotal_software:spring_framework:3.0.1
cpe:/a:pivotal_software:spring_framework:3.0.2
cpe:/a:pivotal_software:spring_framework:3.0.3
cpe:/a:pivotal_software:spring_framework:3.0.4
cpe:/a:pivotal_software:spring_framework:3.0.5
cpe:/a:pivotal_software:spring_framework:3.0.6
cpe:/a:pivotal_software:spring_framework:3.0.7
cpe:/a:pivotal_software:spring_framework:3.1.0
cpe:/a:pivotal_software:spring_framework:3.1.0:rc1
cpe:/a:pivotal_software:spring_framework:3.1.0:rc2
cpe:/a:pivotal_software:spring_framework:3.1.1
cpe:/a:pivotal_software:spring_framework:3.1.2
cpe:/a:pivotal_software:spring_framework:3.1.3
cpe:/a:pivotal_software:spring_framework:3.1.4
cpe:/a:pivotal_software:spring_framework:3.2.0
cpe:/a:pivotal_software:spring_framework:3.2.0:rc1
cpe:/a:pivotal_software:spring_framework:3.2.0:rc2
cpe:/a:pivotal_software:spring_framework:3.2.0:rc2-a
cpe:/a:pivotal_software:spring_framework:3.2.1
cpe:/a:pivotal_software:spring_framework:3.2.2
cpe:/a:pivotal_software:spring_framework:3.2.3
cpe:/a:pivotal_software:spring_framework:3.2.4
cpe:/a:pivotal_software:spring_framework:3.2.5
cpe:/a:pivotal_software:spring_framework:3.2.6
cpe:/a:pivotal_software:spring_framework:3.2.7
cpe:/a:pivotal_software:spring_framework:3.2.8
cpe:/a:pivotal_software:spring_framework:4.0.0
cpe:/a:pivotal_software:spring_framework:4.0.0:rc1
cpe:/a:pivotal_software:spring_framework:4.0.0:rc2
cpe:/a:pivotal_software:spring_framework:4.0.1
cpe:/a:pivotal_software:spring_framework:4.0.2
cpe:/a:pivotal_software:spring_framework:4.0.3
cpe:/a:pivotal_software:spring_framework:4.0.4
Date published: 2017-05-25T13:29:00.207-04:00
Date last modified: 2017-06-07T10:58:46.520-04:00
CVSS Score: 6.8
Principal attack vector: NETWORK
Complexity: MEDIUM
Reference URL: https://pivotal.io/security/cve-2014-0225
Summary: When processing user provided XML documents, the Spring Framework 4.0.0 to 4.0.4, 3.0.0 to 3.2.8, and possibly earlier unsupported versions did not disable by default the resolution of URI references in a DTD declaration. This enabled an XXE attack.