MGASA-2015-0426

Source
https://advisories.mageia.org/MGASA-2015-0426.html
Import Source
https://advisories.mageia.org/MGASA-2015-0426.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0426
Related
Published
2015-11-04T18:03:05Z
Modified
2015-11-04T17:55:43Z
Summary
Updated springframework packages fix security vulnerability
Details

Under some situations, the Spring Framework is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response (CVE-2015-5211).

References
Credits

Affected packages

Mageia:5 / json-smart

Package

Name
json-smart
Purl
pkg:rpm/mageia/json-smart?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3-0.20140820.1.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / json-path

Package

Name
json-path
Purl
pkg:rpm/mageia/json-path?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.1-1.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / springframework

Package

Name
springframework
Purl
pkg:rpm/mageia/springframework?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.15-1.mga5

Ecosystem specific

{
    "section": "core"
}