Total vulnerabilities in the database
VMware SpringSource Spring Framework before 2.5.6.SEC03, 2.5.7.SR023, and 3.x before 3.0.6, when a container supports Expression Language (EL), evaluates EL expressions in tags twice, which allows remote attackers to obtain sensitive information via a (1) name attribute in a (a) spring:hasBindErrors tag; (2) path attribute in a (b) spring:bind or (c) spring:nestedpath tag; (3) arguments, (4) code, (5) text, (6) var, (7) scope, or (8) message attribute in a (d) spring:message or (e) spring:theme tag; or (9) var, (10) scope, or (11) value attribute in a (f) spring:transform tag, aka "Expression Language Injection."
Software | From | Fixed in |
---|---|---|
springsource / spring_framework | 2.5.0 | 2.5.0.x |
springsource / spring_framework | 3.0.1 | 3.0.1.x |
springsource / spring_framework | 2.5.3 | 2.5.3.x |
springsource / spring_framework | 3.0.2 | 3.0.2.x |
springsource / spring_framework | 2.5.5 | 2.5.5.x |
springsource / spring_framework | 2.5.6 | 2.5.6.x |
springsource / spring_framework | - | 2.5.7_sr01.x |
springsource / spring_framework | 2.5.0-rc1 | 2.5.0-rc1.x |
springsource / spring_framework | 3.0.4 | 3.0.4.x |
springsource / spring_framework | 2.5.4 | 2.5.4.x |
springsource / spring_framework | 2.5.0-rc2 | 2.5.0-rc2.x |
springsource / spring_framework | - | 3.0.5.x |
springsource / spring_framework | 3.0.3 | 3.0.3.x |
springsource / spring_framework | 2.5.2 | 2.5.2.x |
springsource / spring_framework | 2.5.7 | 2.5.7.x |
springsource / spring_framework | 3.0.0 | 3.0.0.x |
springsource / spring_framework | 2.5.1 | 2.5.1.x |
![]() |
3.0.0 | 3.0.6 |
![]() |
- | 2.5.6.SEC03 |
![]() |
2.5.7.SR0 | 2.5.7.SR023 |