CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
72.7%
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.
Vendor | Product | Version | CPE |
---|---|---|---|
vmware | spring_framework | * | cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:* |
oracle | application_testing_suite | 12.5.0.3 | cpe:2.3:a:oracle:application_testing_suite:12.5.0.3:*:*:*:*:*:*:* |
oracle | application_testing_suite | 13.1.0.1 | cpe:2.3:a:oracle:application_testing_suite:13.1.0.1:*:*:*:*:*:*:* |
oracle | application_testing_suite | 13.2.0.1 | cpe:2.3:a:oracle:application_testing_suite:13.2.0.1:*:*:*:*:*:*:* |
oracle | application_testing_suite | 13.3.0.1 | cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:* |
oracle | big_data_discovery | 1.6.0 | cpe:2.3:a:oracle:big_data_discovery:1.6.0:*:*:*:*:*:*:* |
oracle | communications_converged_application_server | * | cpe:2.3:a:oracle:communications_converged_application_server:*:*:*:*:*:*:*:* |
oracle | communications_diameter_signaling_router | * | cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* |
oracle | communications_performance_intelligence_center | * | cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:* |
oracle | communications_policy_management | 12.5.0 | cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:* |
www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
www.securityfocus.com/bid/103699
access.redhat.com/errata/RHSA-2018:1320
access.redhat.com/errata/RHSA-2018:2669
access.redhat.com/errata/RHSA-2018:2939
pivotal.io/security/cve-2018-1271
www.oracle.com/security-alerts/cpujul2020.html
www.oracle.com/security-alerts/cpuoct2021.html
www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
72.7%