Spring Framework CVE-2016-9878 Directory Traversal Vulnerability



Spring Framework is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input.

A remote attacker could exploit this issue using directory-traversal characters ('../') to access arbitrary files that contain sensitive information. Information harvested may aid in launching further attacks.

The following versions are affected:

Spring Framework 4.3.0 through 4.3.4
Spring Framework 4.2.0 through 4.2.8
Spring Framework 3.2.0 through 3.2.17

Other unsupported versions may also be affected.

Information

Bugtraq ID: 95072
Class: Input Validation Error
CVE: CVE-2016-9878

Remote: Yes
Local: No
Published: Dec 21 2016 12:00AM
Updated: Jan 17 2018 09:00AM
Credit: NTT Data.
Vulnerable: SpringSource Spring Framework 4.3.4
SpringSource Spring Framework 4.2.8
SpringSource Spring Framework 3.2.17
SpringSource Spring Framework 4.0.4
SpringSource Spring Framework 3.2.9
SpringSource Spring Framework 3.2.8
SpringSource Spring Framework 3.2.4
SpringSource Spring Framework 3.2.3
SpringSource Spring Framework 3.2.2
SpringSource Spring Framework 3.2.1
SpringSource Spring Framework 3.2.0
SpringSource Spring Framework 3.1.1
Oracle Retail Assortment Planning 16.0.1
Oracle Retail Assortment Planning 15.0.3
Oracle Retail Assortment Planning 14.1.3


Not Vulnerable: SpringSource Spring Framework 4.3.5
SpringSource Spring Framework 4.2.9
SpringSource Spring Framework 3.2.18


Exploit


An attacker can use a browser to exploit this issue.


Related Posts