Spring Framework 4.3.x < 4.3.15 / 5.0.x < 5.0.5 Windows Directory Traversal Vulnerability (CVE-2018-1271)

Medium Nessus Plugin ID 119846


The remote Windows host contains a web application framework library that is affected by a directory traversal vulnerability.


The remote Windows host contains a Spring Framework library version that is 4.3.x prior to 4.3.15 or 5.0.x prior to 5.0.5. It is, therefore, affected by a directory traversal vulnerability. An unauthenticated, remote attacker can exploit this, by sending a URI that contains directory traversal characters, to disclose the contents of files located outside of the server's restricted path.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to Spring Framework version 4.3.15 or 5.0.5 or later.

See Also


Plugin Details

Severity: Medium

ID: 119846

File Name: spring_CVE-2018-1271.nasl

Version: 1.3

Type: local

Agent: windows

Family: Windows

Published: 2018/12/21

Updated: 2019/04/30

Dependencies: 11936, 118238

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2018-1271

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 5.9

Temporal Score: 5.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:pivotal_software:spring_framework

Required KB Items: installed_sw/Pivotal Software Spring Framework, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2018/04/05

Vulnerability Publication Date: 2018/04/05

Exploitable With

Elliot (Spring MVC File Disclosure)

Reference Information

CVE: CVE-2018-1271