CVE-2013-6429 – org.springframework:spring-web
Package
Manager: maven
Name: org.springframework:spring-web
Vulnerable Version: >=0 <3.2.5.release
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.58208 pctl0.98122
Details
Cross-Site Request Forgery in Spring Framework The SourceHttpMessageConverter in Spring MVC in Spring Framework before 3.2.5 and 4.0.0.M1 through 4.0.0.RC1 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External Entity (XXE) issue, and a different vulnerability than CVE-2013-4152 and CVE-2013-7315.
Metadata
Created: 2022-05-13T01:02:39Z
Modified: 2024-02-27T23:02:19Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-g6hf-f9cq-q7w7/GHSA-g6hf-f9cq-q7w7.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-g6hf-f9cq-q7w7
Finding: F007
Auto approve: 1