CVE-2018-1271

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-1271
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1271.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-1271
Aliases
Withdrawn
2024-05-15T05:31:23.012948Z
Published
2018-04-06T13:29:00Z
Modified
2023-11-08T03:59:50.958101Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.

References

Affected packages

Git / github.com/spring-projects/spring-framework

Affected ranges

Type
GIT
Repo
https://github.com/spring-projects/spring-framework
Events