Directory traversal vulnerability in Pivotal Spring Framework 3.x before 3.2.9 and 4.0 before 4.0.5 allows remote attackers to read arbitrary files via a crafted URL.
{
"binaries": [
{
"binary_name": "libspring-aop-java",
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1"
},
{
"binary_name": "libspring-beans-java",
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1"
},
{
"binary_name": "libspring-context-java",
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1"
},
{
"binary_name": "libspring-context-support-java",
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1"
},
{
"binary_name": "libspring-core-java",
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1"
},
{
"binary_name": "libspring-expression-java",
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1"
},
{
"binary_name": "libspring-instrument-java",
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1"
},
{
"binary_name": "libspring-jdbc-java",
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1"
},
{
"binary_name": "libspring-jms-java",
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1"
},
{
"binary_name": "libspring-orm-java",
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1"
},
{
"binary_name": "libspring-oxm-java",
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1"
},
{
"binary_name": "libspring-test-java",
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1"
},
{
"binary_name": "libspring-transaction-java",
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1"
},
{
"binary_name": "libspring-web-java",
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1"
},
{
"binary_name": "libspring-web-portlet-java",
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1"
},
{
"binary_name": "libspring-web-servlet-java",
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1"
},
{
"binary_name": "libspring-web-struts-java",
"binary_version": "3.0.6.RELEASE-13ubuntu0.1~esm1"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}