taddhopkins / maven-project

Maven project with no Jenkinsfile for use with 'pom.xml' custom marker for Pipeline Multi-branch/repo scanning
0 stars 1 forks source link

CVE-2015-5211 (High) detected in spring-web-4.0.5.RELEASE.jar #4

Open mend-for-github-com[bot] opened 4 years ago

mend-for-github-com[bot] commented 4 years ago

CVE-2015-5211 - High Severity Vulnerability

Vulnerable Library - spring-web-4.0.5.RELEASE.jar

Spring Web

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /pom.xml

Path to vulnerable library: /epository/org/springframework/spring-web/4.0.5.RELEASE/spring-web-4.0.5.RELEASE.jar,/target/todo-api-1.0-SNAPSHOT/WEB-INF/lib/spring-web-4.0.5.RELEASE.jar

Dependency Hierarchy: - :x: **spring-web-4.0.5.RELEASE.jar** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response.

Publish Date: 2017-05-25

URL: CVE-2015-5211

CVSS 3 Score Details (9.6)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5211

Release Date: 2017-05-25

Fix Resolution: 4.1.8.RELEASE


:rescue_worker_helmet: Automatic Remediation is available for this issue