CVE-2014-0225CVE-2014-0225

Affected configuration(s):

cpe:/a:pivotal_software:spring_framework:3.0.0
cpe:/a:pivotal_software:spring_framework:3.0.1
cpe:/a:pivotal_software:spring_framework:3.0.2
cpe:/a:pivotal_software:spring_framework:3.0.3
cpe:/a:pivotal_software:spring_framework:3.0.4
cpe:/a:pivotal_software:spring_framework:3.0.5
cpe:/a:pivotal_software:spring_framework:3.0.6
cpe:/a:pivotal_software:spring_framework:3.0.7
cpe:/a:pivotal_software:spring_framework:3.1.0
cpe:/a:pivotal_software:spring_framework:3.1.0:rc1
cpe:/a:pivotal_software:spring_framework:3.1.0:rc2
cpe:/a:pivotal_software:spring_framework:3.1.1
cpe:/a:pivotal_software:spring_framework:3.1.2
cpe:/a:pivotal_software:spring_framework:3.1.3
cpe:/a:pivotal_software:spring_framework:3.1.4
cpe:/a:pivotal_software:spring_framework:3.2.0
cpe:/a:pivotal_software:spring_framework:3.2.0:rc1
cpe:/a:pivotal_software:spring_framework:3.2.0:rc2
cpe:/a:pivotal_software:spring_framework:3.2.0:rc2-a
cpe:/a:pivotal_software:spring_framework:3.2.1
cpe:/a:pivotal_software:spring_framework:3.2.2
cpe:/a:pivotal_software:spring_framework:3.2.3
cpe:/a:pivotal_software:spring_framework:3.2.4
cpe:/a:pivotal_software:spring_framework:3.2.5
cpe:/a:pivotal_software:spring_framework:3.2.6
cpe:/a:pivotal_software:spring_framework:3.2.7
cpe:/a:pivotal_software:spring_framework:3.2.8
cpe:/a:pivotal_software:spring_framework:4.0.0
cpe:/a:pivotal_software:spring_framework:4.0.0:rc1
cpe:/a:pivotal_software:spring_framework:4.0.0:rc2
cpe:/a:pivotal_software:spring_framework:4.0.1
cpe:/a:pivotal_software:spring_framework:4.0.2
cpe:/a:pivotal_software:spring_framework:4.0.3
cpe:/a:pivotal_software:spring_framework:4.0.4

Date published: 2017-05-25T13:29:00.207-04:00

Date last modified: 2017-06-07T10:58:46.520-04:00

CVSS Score: 6.8

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: https://pivotal.io/security/cve-2014-0225

Summary: When processing user provided XML documents, the Spring Framework 4.0.0 to 4.0.4, 3.0.0 to 3.2.8, and possibly earlier unsupported versions did not disable by default the resolution of URI references in a DTD declaration. This enabled an XXE attack.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.