CVE-2016-9878
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
29/12/2016
Last modified:
12/04/2025
Description
An issue was discovered in Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x before 4.3.5. Paths provided to the ResourceServlet were not properly sanitized and as a result exposed to directory traversal attacks.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:pivotal_software:spring_framework:*:*:*:*:*:*:*:* | 3.2.0 (including) | |
| cpe:2.3:a:pivotal_software:spring_framework:4.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:pivotal_software:spring_framework:4.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:spring_framework:3.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:spring_framework:3.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:spring_framework:3.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:spring_framework:3.2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:spring_framework:3.2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:spring_framework:3.2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:spring_framework:3.2.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:spring_framework:3.2.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:spring_framework:3.2.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:spring_framework:3.2.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:spring_framework:3.2.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:spring_framework:3.2.12:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.securityfocus.com/bid/95072
- http://www.securitytracker.com/id/1040698
- https://access.redhat.com/errata/RHSA-2017:3115
- https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html
- https://pivotal.io/security/cve-2016-9878
- https://security.netapp.com/advisory/ntap-20180419-0002/
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.securityfocus.com/bid/95072
- http://www.securitytracker.com/id/1040698
- https://access.redhat.com/errata/RHSA-2017:3115
- https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html
- https://pivotal.io/security/cve-2016-9878
- https://security.netapp.com/advisory/ntap-20180419-0002/
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html



