Directory traversal vulnerability in Pivotal Spring Framework 3.x before 3.2.9 and 4.0 before 4.0.5 allows remote attackers to read arbitrary files via a crafted URL.
{
"binaries": [
{
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1",
"binary_name": "libspring-aop-java"
},
{
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1",
"binary_name": "libspring-beans-java"
},
{
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1",
"binary_name": "libspring-context-java"
},
{
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1",
"binary_name": "libspring-context-support-java"
},
{
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1",
"binary_name": "libspring-core-java"
},
{
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1",
"binary_name": "libspring-expression-java"
},
{
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1",
"binary_name": "libspring-instrument-java"
},
{
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1",
"binary_name": "libspring-jdbc-java"
},
{
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1",
"binary_name": "libspring-jms-java"
},
{
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1",
"binary_name": "libspring-orm-java"
},
{
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1",
"binary_name": "libspring-oxm-java"
},
{
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1",
"binary_name": "libspring-test-java"
},
{
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1",
"binary_name": "libspring-transaction-java"
},
{
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1",
"binary_name": "libspring-web-java"
},
{
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1",
"binary_name": "libspring-web-portlet-java"
},
{
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1",
"binary_name": "libspring-web-servlet-java"
},
{
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1",
"binary_name": "libspring-web-struts-java"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}