CVE-2011-2730

VMware SpringSource Spring Framework before 2.5.6.SEC03, 2.5.7.SR023, and 3.x before 3.0.6, when a container supports Expression Language (EL), evaluates EL expressions in tags twice, which allows remote attackers to obtain sensitive information via a (1) name attribute in a (a) spring:hasBindErrors tag; (2) path attribute in a (b) spring:bind or (c) spring:nestedpath tag; (3) arguments, (4) code, (5) text, (6) var, (7) scope, or (8) message attribute in a (d) spring:message or (e) spring:theme tag; or (9) var, (10) scope, or (11) value attribute in a (f) spring:transform tag, aka "Expression Language Injection."
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677814
http://rhn.redhat.com/errata/RHSA-2013-0191.html
http://rhn.redhat.com/errata/RHSA-2013-0192.html
http://rhn.redhat.com/errata/RHSA-2013-0193.html
http://rhn.redhat.com/errata/RHSA-2013-0194.html
http://rhn.redhat.com/errata/RHSA-2013-0195.html
http://rhn.redhat.com/errata/RHSA-2013-0196.html
http://rhn.redhat.com/errata/RHSA-2013-0197.html
http://rhn.redhat.com/errata/RHSA-2013-0198.html
http://rhn.redhat.com/errata/RHSA-2013-0221.html
http://rhn.redhat.com/errata/RHSA-2013-0533.html
http://secunia.com/advisories/51984
http://secunia.com/advisories/52054
http://secunia.com/advisories/55155
http://support.springsource.com/security/cve-2011-2730 Vendor Advisory
http://www.debian.org/security/2012/dsa-2504
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.securitytracker.com/id/1029151
https://docs.google.com/document/d/1dc1xxO8UMFaGLOwgkykYdghGWm_2Gn0iCrxFsympqcE/edit
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677814
http://rhn.redhat.com/errata/RHSA-2013-0191.html
http://rhn.redhat.com/errata/RHSA-2013-0192.html
http://rhn.redhat.com/errata/RHSA-2013-0193.html
http://rhn.redhat.com/errata/RHSA-2013-0194.html
http://rhn.redhat.com/errata/RHSA-2013-0195.html
http://rhn.redhat.com/errata/RHSA-2013-0196.html
http://rhn.redhat.com/errata/RHSA-2013-0197.html
http://rhn.redhat.com/errata/RHSA-2013-0198.html
http://rhn.redhat.com/errata/RHSA-2013-0221.html
http://rhn.redhat.com/errata/RHSA-2013-0533.html
http://secunia.com/advisories/51984
http://secunia.com/advisories/52054
http://secunia.com/advisories/55155
http://support.springsource.com/security/cve-2011-2730 Vendor Advisory
http://www.debian.org/security/2012/dsa-2504
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.securitytracker.com/id/1029151
https://docs.google.com/document/d/1dc1xxO8UMFaGLOwgkykYdghGWm_2Gn0iCrxFsympqcE/edit
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:springsource:spring_framework:*:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:*:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:2.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:2.5.0:rc2:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:2.5.5:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:2.5.7:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:springsource:spring_framework:3.0.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:28

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677814 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677814 -
References () http://rhn.redhat.com/errata/RHSA-2013-0191.html - () http://rhn.redhat.com/errata/RHSA-2013-0191.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0192.html - () http://rhn.redhat.com/errata/RHSA-2013-0192.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0193.html - () http://rhn.redhat.com/errata/RHSA-2013-0193.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0194.html - () http://rhn.redhat.com/errata/RHSA-2013-0194.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0195.html - () http://rhn.redhat.com/errata/RHSA-2013-0195.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0196.html - () http://rhn.redhat.com/errata/RHSA-2013-0196.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0197.html - () http://rhn.redhat.com/errata/RHSA-2013-0197.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0198.html - () http://rhn.redhat.com/errata/RHSA-2013-0198.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0221.html - () http://rhn.redhat.com/errata/RHSA-2013-0221.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0533.html - () http://rhn.redhat.com/errata/RHSA-2013-0533.html -
References () http://secunia.com/advisories/51984 - () http://secunia.com/advisories/51984 -
References () http://secunia.com/advisories/52054 - () http://secunia.com/advisories/52054 -
References () http://secunia.com/advisories/55155 - () http://secunia.com/advisories/55155 -
References () http://support.springsource.com/security/cve-2011-2730 - Vendor Advisory () http://support.springsource.com/security/cve-2011-2730 - Vendor Advisory
References () http://www.debian.org/security/2012/dsa-2504 - () http://www.debian.org/security/2012/dsa-2504 -
References () http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html - () http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -
References () http://www.securitytracker.com/id/1029151 - () http://www.securitytracker.com/id/1029151 -
References () https://docs.google.com/document/d/1dc1xxO8UMFaGLOwgkykYdghGWm_2Gn0iCrxFsympqcE/edit - () https://docs.google.com/document/d/1dc1xxO8UMFaGLOwgkykYdghGWm_2Gn0iCrxFsympqcE/edit -

Information

Published : 2012-12-05 17:55

Updated : 2024-11-21 01:28


NVD link : CVE-2011-2730

Mitre link : CVE-2011-2730

CVE.ORG link : CVE-2011-2730


JSON object : View

Products Affected

springsource

  • spring_framework
CWE
CWE-16

Configuration