Vulnerability identifier: #VU88950
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Pivotal Spring Framework
Server applications /
Frameworks for developing and running applications
Vendor: Pivotal
Description
The vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to Spring MVC in Spring Framework does not disable external entity resolution for the StAX XMLInputFactory. A remote attacker can read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML with JAXB, aka an XML External Entity (XXE) issue.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability..
Vulnerable software versions
Pivotal Spring Framework: before 3.2.4, 3.2.4
External links
https://www.gopivotal.com/security/cve-2013-4152
https://www.debian.org/security/2014/dsa-2842
https://jira.springsource.org/browse/SPR-10806
https://seclists.org/bugtraq/2013/Aug/154
https://seclists.org/fulldisclosure/2013/Nov/14
https://www.securityfocus.com/bid/77998
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.