2020-01-03 21:01:04 +00:00
{
2020-04-16 19:01:28 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"data_version" : "4.0" ,
"CVE_data_meta" : {
"ASSIGNER" : "security@pivotal.io" ,
"DATE_PUBLIC" : "2020-01-16T00:00:00.000Z" ,
"ID" : "CVE-2020-5398" ,
"STATE" : "PUBLIC" ,
"TITLE" : "RFD Attack via \"Content-Disposition\" Header Sourced from Request Input by Spring MVC or Spring WebFlux Application"
2020-01-16 15:49:19 -08:00
} ,
2020-04-16 19:01:28 +00:00
"source" : {
"discovery" : "UNKNOWN"
2020-01-16 15:49:19 -08:00
} ,
2020-04-16 19:01:28 +00:00
"affects" : {
"vendor" : {
"vendor_data" : [
2020-01-16 15:49:19 -08:00
{
2020-04-16 19:01:28 +00:00
"product" : {
"product_data" : [
2020-01-16 15:49:19 -08:00
{
2020-04-16 19:01:28 +00:00
"product_name" : "Spring Framework" ,
"version" : {
"version_data" : [
2020-01-16 15:49:19 -08:00
{
2020-04-16 19:01:28 +00:00
"affected" : "<" ,
"version_name" : "5.0" ,
"version_value" : "v5.0.16.RELEASE"
2020-01-16 15:49:19 -08:00
} ,
{
2020-04-16 19:01:28 +00:00
"affected" : "<" ,
"version_name" : "5.1" ,
"version_value" : "v5.1.13.RELEASE"
2020-01-16 15:49:19 -08:00
} ,
{
2020-04-16 19:01:28 +00:00
"affected" : "<" ,
"version_name" : "5.2" ,
"version_value" : "v5.2.3.RELEASE"
2020-01-16 15:49:19 -08:00
}
]
}
}
]
} ,
2020-04-16 19:01:28 +00:00
"vendor_name" : "Spring"
2020-01-16 15:49:19 -08:00
}
]
}
2020-01-03 21:01:04 +00:00
} ,
2020-04-16 19:01:28 +00:00
"description" : {
"description_data" : [
2020-01-03 21:01:04 +00:00
{
2020-04-16 19:01:28 +00:00
"lang" : "eng" ,
"value" : "In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a \"Content-Disposition\" header in the response where the filename attribute is derived from user supplied input."
2020-01-16 15:49:19 -08:00
}
]
} ,
2020-04-16 19:01:28 +00:00
"problemtype" : {
"problemtype_data" : [
2020-01-16 15:49:19 -08:00
{
2020-04-16 19:01:28 +00:00
"description" : [
2020-01-16 15:49:19 -08:00
{
2020-04-16 19:01:28 +00:00
"lang" : "eng" ,
"value" : "CWE-79: Cross-site Scripting (XSS) - Reflected"
2020-01-16 15:49:19 -08:00
}
]
2020-01-03 21:01:04 +00:00
}
]
2020-01-16 15:49:19 -08:00
} ,
2020-04-16 19:01:28 +00:00
"references" : {
"reference_data" : [
2020-02-20 16:01:05 +00:00
{
2020-04-16 19:01:28 +00:00
"refsource" : "MLIST" ,
"name" : "[camel-commits] 20200220 [camel] branch camel-2.25.x updated: Updating Spring due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/rf8dc72b974ee74f17bce661ea7d124e733a1f4c4f236354ac0cf48e8@%3Ccommits.camel.apache.org%3E"
2020-04-10 20:01:17 +00:00
} ,
{
2020-04-16 19:01:28 +00:00
"refsource" : "MLIST" ,
"name" : "[geode-dev] 20200410 Proposal to bring GEODE-7970 to support/1.12" ,
"url" : "https://lists.apache.org/thread.html/rc05acaacad089613e9642f939b3a44f7199b5537493945c3e045287f@%3Cdev.geode.apache.org%3E"
2020-04-10 21:01:15 +00:00
} ,
{
2020-04-16 19:01:28 +00:00
"refsource" : "MLIST" ,
"name" : "[geode-dev] 20200410 Re: Proposal to bring GEODE-7970 to support/1.12" ,
"url" : "https://lists.apache.org/thread.html/rdcaadaa9a68b31b7d093d76eacfaacf6c7a819f976b595c75ad2d4dc@%3Cdev.geode.apache.org%3E"
2020-04-14 14:04:09 -07:00
} ,
2020-05-14 10:01:13 +00:00
{
"refsource" : "MLIST" ,
"name" : "[karaf-issues] 20200514 [jira] [Created] (KARAF-6721) Update Spring versions due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/r7361bfe84bde9d233f9800c3a96673e7bd81207549ced0236f07a29d@%3Cissues.karaf.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-issues] 20200514 [jira] [Commented] (KARAF-6721) Update Spring versions due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/r9fb1ee08cf337d16c3364feb0f35a072438c1a956afd7b77859aa090@%3Cissues.karaf.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-commits] 20200514 [GitHub] [karaf] coheigea opened a new pull request #1118: KARAF-6721 - Update Spring versions due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/r0f3530f7cb510036e497532ffc4e0bd0b882940448cf4e233994b08b@%3Ccommits.karaf.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-issues] 20200514 [jira] [Updated] (KARAF-6721) Update Spring versions due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/r8736185eb921022225a83e56d7285a217fd83f5524bd64a6ca3bf5cc@%3Cissues.karaf.apache.org%3E"
2020-05-14 11:01:15 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-commits] 20200514 [GitHub] [karaf] skitt commented on a change in pull request #1118: KARAF-6721 - Update Spring versions due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/r7d5e518088e2e778928b02bcd3be3b948b59acefe2f0ebb57ec2ebb0@%3Ccommits.karaf.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-commits] 20200514 [GitHub] [karaf] coheigea commented on a change in pull request #1118: KARAF-6721 - Update Spring versions due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/r3765353ff434fd00d8fa5a44734b3625a06eeb2a3fb468da7dfae134@%3Ccommits.karaf.apache.org%3E"
2020-05-17 06:01:19 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-issues] 20200517 [jira] [Updated] (KARAF-6721) Upgrade to Spring 5.1.14.RELEASE and 5.2.5.RELEASE due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/rab0de39839b4c208dcd73f01e12899dc453361935a816a784548e048@%3Cissues.karaf.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-issues] 20200517 [jira] [Assigned] (KARAF-6721) Update Spring versions due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/r1bc5d673c01cfbb8e4a91914e9748ead3e5f56b61bca54d314c0419b@%3Cissues.karaf.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-issues] 20200517 [jira] [Updated] (KARAF-6721) Update Spring versions due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/r4b1886e82cc98ef38f582fef7d4ea722e3fcf46637cd4674926ba682@%3Cissues.karaf.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-commits] 20200517 [GitHub] [karaf] jbonofre commented on pull request #1118: KARAF-6721 - Update Spring versions due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/reaa8a6674baf2724b1b88a621b0d72d9f7a6f5577c88759842c16eb6@%3Ccommits.karaf.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-commits] 20200517 [GitHub] [karaf] jbonofre commented on a change in pull request #1118: KARAF-6721 - Update Spring versions due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/r74f81f93a9b69140fe41e236afa7cbe8dfa75692e7ab31a468fddaa0@%3Ccommits.karaf.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-issues] 20200517 [jira] [Commented] (KARAF-6721) Update Spring versions due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/r028977b9b9d44a89823639aa3296fb0f0cfdd76b4450df89d3c4fbbf@%3Cissues.karaf.apache.org%3E"
2020-05-18 07:01:17 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-issues] 20200518 [jira] [Commented] (KARAF-6721) Upgrade to Spring 5.1.14.RELEASE and 5.2.5.RELEASE due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/r2dfd5b331b46d3f90c4dd63a060e9f04300468293874bd7e41af7163@%3Cissues.karaf.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-commits] 20200518 [GitHub] [karaf] jbonofre commented on pull request #1118: KARAF-6721 - Update Spring versions due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/r8cc37a60a5056351377ee5f1258f2a4fdd39822a257838ba6bcc1e88@%3Ccommits.karaf.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-commits] 20200518 [GitHub] [karaf] jbonofre removed a comment on pull request #1118: KARAF-6721 - Update Spring versions due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/r1accbd4f31ad2f40e1661d70a4510a584eb3efd1e32e8660ccf46676@%3Ccommits.karaf.apache.org%3E"
2020-05-18 10:01:15 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-commits] 20200518 [GitHub] [karaf] jbonofre merged pull request #1118: KARAF-6721 - Update Spring versions due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/rb4d1fc078f086ec2e98b2693e8b358e58a6a4ef903ceed93a1ee2b18@%3Ccommits.karaf.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-commits] 20200518 [karaf] branch karaf-4.2.x updated: KARAF-6721 - Update Spring versions due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/r6dac0e365d1b2df9a7ffca12b4195181ec14ff0abdf59e1fdb088ce5@%3Ccommits.karaf.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-commits] 20200518 [karaf] branch master updated: KARAF-6721 - Update Spring versions due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/r4639e821ef9ca6ca10887988f410a60261400a7766560e7a97a22efc@%3Ccommits.karaf.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[karaf-issues] 20200518 [jira] [Resolved] (KARAF-6721) Upgrade to Spring 5.1.14.RELEASE and 5.2.5.RELEASE due to CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/r0f2d0ae1bad2edb3d4a863d77f3097b5e88cfbdae7b809f4f42d6aad@%3Cissues.karaf.apache.org%3E"
2020-05-27 09:01:18 +00:00
} ,
2020-07-15 03:02:07 +00:00
{
"url" : "https://www.oracle.com/security-alerts/cpuapr2020.html" ,
"refsource" : "MISC" ,
"name" : "https://www.oracle.com/security-alerts/cpuapr2020.html"
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpujul2020.html" ,
"refsource" : "MISC" ,
"name" : "https://www.oracle.com/security-alerts/cpujul2020.html"
} ,
{
"refsource" : "CONFIRM" ,
"url" : "https://pivotal.io/security/cve-2020-5398" ,
"name" : "https://pivotal.io/security/cve-2020-5398"
} ,
2020-05-27 09:01:18 +00:00
{
"refsource" : "MISC" ,
"name" : "https://lists.apache.org/thread.html/r712a6fce928e24e7b6ec30994a7e115a70f1f6e4cf2c2fbf0347ce46@%3Ccommits.servicecomb.apache.org%3E" ,
"url" : "https://lists.apache.org/thread.html/r712a6fce928e24e7b6ec30994a7e115a70f1f6e4cf2c2fbf0347ce46@%3Ccommits.servicecomb.apache.org%3E"
2020-06-18 15:01:23 +00:00
} ,
{
"refsource" : "MISC" ,
"name" : "https://lists.apache.org/thread.html/ra996b56e1f5ab2fed235a8b91fa0cc3cf34c2e9fee290b7fa4380a0d@%3Ccommits.servicecomb.apache.org%3E" ,
"url" : "https://lists.apache.org/thread.html/ra996b56e1f5ab2fed235a8b91fa0cc3cf34c2e9fee290b7fa4380a0d@%3Ccommits.servicecomb.apache.org%3E"
} ,
{
"refsource" : "MISC" ,
"name" : "https://lists.apache.org/thread.html/r881fb5a95ab251106fed38f836257276feb026bfe01290e72ff91c2a@%3Ccommits.servicecomb.apache.org%3E" ,
"url" : "https://lists.apache.org/thread.html/r881fb5a95ab251106fed38f836257276feb026bfe01290e72ff91c2a@%3Ccommits.servicecomb.apache.org%3E"
2020-10-13 20:01:36 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[ambari-issues] 20201013 [jira] [Created] (AMBARI-25571) Vulnerable Spring components in Ambari - CVE-2020-5398, CVE-2020-5421" ,
"url" : "https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a@%3Cissues.ambari.apache.org%3E"
2020-10-19 19:01:42 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[ambari-dev] 20201019 [GitHub] [ambari] dlysnichenko opened a new pull request #3246: AMBARI-25571. Vulnerable Spring components in Ambari - CVE-2020-5398, CVE-2020-5421" ,
"url" : "https://lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1@%3Cdev.ambari.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[ambari-dev] 20201019 [GitHub] [ambari] dlysnichenko merged pull request #3246: AMBARI-25571. Vulnerable Spring components in Ambari - CVE-2020-5398, CVE-2020-5421" ,
"url" : "https://lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a@%3Cdev.ambari.apache.org%3E"
2020-10-19 19:02:18 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[ambari-commits] 20201019 [ambari] branch branch-2.7 updated: AMBARI-25571. Vulnerable Spring components in Ambari - CVE-2020-5398, CVE-2020-5421 (dlysnichenko) (#3246)" ,
"url" : "https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163@%3Ccommits.ambari.apache.org%3E"
2020-10-20 12:39:21 -07:00
} ,
{
2020-10-20 22:01:54 +00:00
"url" : "https://www.oracle.com/security-alerts/cpuoct2020.html" ,
"refsource" : "MISC" ,
"name" : "https://www.oracle.com/security-alerts/cpuoct2020.html"
2020-10-21 18:02:45 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[ambari-issues] 20201021 [jira] [Resolved] (AMBARI-25571) Vulnerable Spring components in Ambari - CVE-2020-5398, CVE-2020-5421" ,
"url" : "https://lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5@%3Cissues.ambari.apache.org%3E"
2021-01-19 13:08:08 -08:00
} ,
{
2021-01-20 15:02:47 +00:00
"url" : "https://www.oracle.com/security-alerts/cpujan2021.html" ,
"refsource" : "MISC" ,
"name" : "https://www.oracle.com/security-alerts/cpujan2021.html"
2021-03-17 10:00:48 +00:00
} ,
2021-06-14 18:01:21 +00:00
{
"refsource" : "MLIST" ,
"name" : "[rocketmq-dev] 20210317 [GitHub] [rocketmq-externals] vongosling commented on issue #690: Spring Framework CVE-2020-5398" ,
"url" : "https://lists.apache.org/thread.html/rc9c7f96f08c8554225dba9050ea5e64bebc129d0d836303143fe3160@%3Cdev.rocketmq.apache.org%3E"
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpuApr2021.html" ,
"refsource" : "MISC" ,
"name" : "https://www.oracle.com/security-alerts/cpuApr2021.html"
} ,
2021-03-17 10:00:48 +00:00
{
"refsource" : "MISC" ,
"name" : "https://lists.apache.org/thread.html/rded5291e25a4c4085a6d43cf262e479140198bf4eabb84986e0a1ef3@%3Cdev.rocketmq.apache.org%3E" ,
"url" : "https://lists.apache.org/thread.html/rded5291e25a4c4085a6d43cf262e479140198bf4eabb84986e0a1ef3@%3Cdev.rocketmq.apache.org%3E"
2021-03-18 03:00:46 +00:00
} ,
{
"refsource" : "MISC" ,
"name" : "https://lists.apache.org/thread.html/r645408661a8df9158f49e337072df39838fa76da629a7e25a20928a6@%3Cdev.rocketmq.apache.org%3E" ,
"url" : "https://lists.apache.org/thread.html/r645408661a8df9158f49e337072df39838fa76da629a7e25a20928a6@%3Cdev.rocketmq.apache.org%3E"
} ,
{
"refsource" : "MISC" ,
"name" : "https://lists.apache.org/thread.html/r27552d2fa10d96f2810c50d16ad1fd1899e37796c81a0c5e7585a02d@%3Cdev.rocketmq.apache.org%3E" ,
"url" : "https://lists.apache.org/thread.html/r27552d2fa10d96f2810c50d16ad1fd1899e37796c81a0c5e7585a02d@%3Cdev.rocketmq.apache.org%3E"
2020-01-16 15:49:19 -08:00
}
]
} ,
2020-04-16 19:01:28 +00:00
"impact" : {
"cvss" : {
"attackComplexity" : "HIGH" ,
"attackVector" : "NETWORK" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8 ,
"baseSeverity" : "HIGH" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"privilegesRequired" : "LOW" ,
"scope" : "CHANGED" ,
"userInteraction" : "REQUIRED" ,
"vectorString" : "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" ,
"version" : "3.0"
2020-01-16 15:49:19 -08:00
}
2020-01-03 21:01:04 +00:00
}
}