Lucene search

K
githubGitHub Advisory DatabaseGHSA-VPR3-F594-MG5G
HistoryMay 17, 2022 - 3:28 a.m.

Improper Control of Generation of Code ('Code Injection') in Spring Framework

2022-05-1703:28:34
CWE-94
GitHub Advisory Database
github.com
26

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

9.6 High

AI Score

Confidence

High

0.036 Low

EPSS

Percentile

91.8%

SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.

Affected configurations

Vulners
Node
org.springframework\Matchspring
OR
org.springframework\Matchspring

References

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

9.6 High

AI Score

Confidence

High

0.036 Low

EPSS

Percentile

91.8%