Spring Framework is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input.
A remote attacker could exploit this issue using directory-traversal characters ('../') to access arbitrary files that contain sensitive information. Information harvested may aid in launching further attacks.
The following versions are affected:
Spring Framework 4.3.0 through 4.3.4
Spring Framework 4.2.0 through 4.2.8
Spring Framework 3.2.0 through 3.2.17
Other unsupported versions may also be affected.
Information
SpringSource Spring Framework 4.2.8
SpringSource Spring Framework 3.2.17
SpringSource Spring Framework 4.0.4
SpringSource Spring Framework 3.2.9
SpringSource Spring Framework 3.2.8
SpringSource Spring Framework 3.2.4
SpringSource Spring Framework 3.2.3
SpringSource Spring Framework 3.2.2
SpringSource Spring Framework 3.2.1
SpringSource Spring Framework 3.2.0
SpringSource Spring Framework 3.1.1
Oracle Retail Assortment Planning 16.0.1
Oracle Retail Assortment Planning 15.0.3
Oracle Retail Assortment Planning 14.1.3
SpringSource Spring Framework 4.2.9
SpringSource Spring Framework 3.2.18
Exploit
An attacker can use a browser to exploit this issue.
References: