
We found results for “”
CVE-2020-5398
Good to know:


Date: January 16, 2020
In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.
Language: Java
Severity Score
Related Resources (83)
Severity Score
Weakness Type (CWE)
Top Fix

Upgrade Version
Upgrade to version org.apache.activemq.examples.modules:artemis-tomcat-jndi-resources-sample:2.10.0;org.apache.activemq.examples.modules:artemis-tomcat-jndi-resources-sample:2.17.0;org.apache.activemq.examples.modules:artemis-tomcat-jndi-resources-sample:2.14.0;org.apache.activemq.examples.modules:artemis-tomcat-jndi-resources-sample:2.12.0;org.apache.activemq.examples.modules:artemis-tomcat-jndi-resources-sample:2.19.0;org.apache.activemq.examples.modules:artemis-tomcat-jndi-resources-sample:2.8.0;org.apache.activemq.examples.modules:artemis-tomcat-jndi-resources-sample:2.10.1;org.apache.activemq.examples.modules:artemis-jms-bridge:2.10.1;org.apache.activemq.examples.modules:artemis-jms-bridge:2.17.0;org.apache.activemq.examples.modules:artemis-jms-bridge:2.10.0;org.apache.activemq.examples.modules:artemis-jms-bridge:2.8.0;org.apache.activemq.examples.modules:artemis-jms-bridge:2.12.0;org.apache.activemq.examples.modules:artemis-jms-bridge:2.19.0;org.apache.activemq.examples.modules:artemis-jms-bridge:2.14.0;org.springframework:spring-web:5.0.16.RELEASE;org.springframework:spring-web:5.1.13.RELEASE;org.springframework:spring-web:5.2.3.RELEASE;org.apache.cxf.services.xkms:cxf-services-xkms-war:3.2.8;org.apache.cxf.services.xkms:cxf-services-xkms-war:3.3.7;org.apache.cxf.services.xkms:cxf-services-xkms-war:3.2.8;org.optaweb.vehiclerouting:optaweb-vehicle-routing-backend:no_fix;org.apache.servicemix.bundles:org.apache.servicemix.bundles.spring-web:5.1.6.RELEASE_1;org.apache.servicemix.bundles:org.apache.servicemix.bundles.spring-web:5.2.3.RELEASE_1;org.apache.servicemix.bundles:org.apache.servicemix.bundles.spring-web:5.0.17.RELEASE_1;org.apache.servicemix.bundles:org.apache.servicemix.bundles.spring-web:5.0.11.RELEASE_1;org.apache.servicemix.bundles:org.apache.servicemix.bundles.spring-web:5.0.13.RELEASE_1;org.apache.servicemix.bundles:org.apache.servicemix.bundles.spring-web:5.1.14.RELEASE_1;org.apache.activemq.examples.broker.camel:camel-war:2.10.0;org.apache.activemq.examples.broker.camel:camel-war:2.8.0;org.optaweb.employeerostering:employee-rostering-backend:no_fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | NONE |
User Interaction (UI): | REQUIRED |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | HIGH |
Authentication (AU): | NONE |
Confidentiality (C): | COMPLETE |
Integrity (I): | COMPLETE |
Availability (A): | COMPLETE |
Additional information: |