Spring Framework 4.3.x < 4.3.15 / 5.0.x < 5.0.5 Windows Directory Traversal Vulnerability (CVE-2018-1271)

medium Nessus Plugin ID 119846

Synopsis

The remote Windows host contains a web application framework library that is affected by a directory traversal vulnerability.

Description

The remote Windows host contains a Spring Framework library version that is 4.3.x prior to 4.3.15 or 5.0.x prior to 5.0.5. It is, therefore, affected by a directory traversal vulnerability. An unauthenticated, remote attacker can exploit this, by sending a URI that contains directory traversal characters, to disclose the contents of files located outside of the server's restricted path.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Spring Framework version 4.3.15 or 5.0.5 or later.

See Also

https://pivotal.io/security/cve-2018-1271

Plugin Details

Severity: Medium

ID: 119846

File Name: spring_CVE-2018-1271.nasl

Version: 1.4

Type: local

Agent: windows

Family: Windows

Published: 12/21/2018

Updated: 4/11/2022

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.1

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2018-1271

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:pivotal_software:spring_framework

Required KB Items: Settings/ParanoidReport, installed_sw/Pivotal Software Spring Framework

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/5/2018

Vulnerability Publication Date: 4/5/2018

Exploitable With

Elliot (Spring MVC File Disclosure)

Reference Information

CVE: CVE-2018-1271