CVE-2020-5421

medium

Description

In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.

References

https://tanzu.vmware.com/security/cve-2020-5421

https://lists.apache.org/thread.html/[email protected]%3Cdev.ranger.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cissues.ambari.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.ambari.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.ambari.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.ambari.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cissues.ambari.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.hive.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cissues.hive.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cissues.hive.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.pulsar.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.pulsar.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.pulsar.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.pulsar.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cuser.ignite.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cuser.ignite.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cissues.hive.apache.org%3E

https://www.oracle.com/security-alerts/cpujan2021.html

https://security.netapp.com/advisory/ntap-20210513-0009/

https://www.oracle.com/security-alerts/cpuApr2021.html

https://www.oracle.com//security-alerts/cpujul2021.html

https://www.oracle.com/security-alerts/cpuoct2021.html

https://www.oracle.com/security-alerts/cpujan2022.html

https://www.oracle.com/security-alerts/cpuapr2022.html

Details

Source: MITRE

Published: 2020-09-19

Updated: 2023-03-01

Risk Information

CVSS v2

Base Score: 3.6

Vector: AV:N/AC:H/Au:S/C:P/I:P/A:N

Impact Score: 4.9

Exploitability Score: 3.9

Severity: LOW

CVSS v3

Base Score: 6.5

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N

Impact Score: 4.7

Exploitability Score: 1.3

Severity: MEDIUM