CVE-2011-2730
Severity CVSS v4.0:
Pending analysis
Type:
CWE-16
Configuration Errors
Publication date:
05/12/2012
Last modified:
11/04/2025
Description
VMware SpringSource Spring Framework before 2.5.6.SEC03, 2.5.7.SR023, and 3.x before 3.0.6, when a container supports Expression Language (EL), evaluates EL expressions in tags twice, which allows remote attackers to obtain sensitive information via a (1) name attribute in a (a) spring:hasBindErrors tag; (2) path attribute in a (b) spring:bind or (c) spring:nestedpath tag; (3) arguments, (4) code, (5) text, (6) var, (7) scope, or (8) message attribute in a (d) spring:message or (e) spring:theme tag; or (9) var, (10) scope, or (11) value attribute in a (f) spring:transform tag, aka "Expression Language Injection."
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:springsource:spring_framework:*:*:*:*:*:*:*:* | 2.5.7_sr01 (including) | |
cpe:2.3:a:springsource:spring_framework:*:*:*:*:*:*:*:* | 3.0.5 (including) | |
cpe:2.3:a:springsource:spring_framework:2.5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:springsource:spring_framework:2.5.0:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:springsource:spring_framework:2.5.0:rc2:*:*:*:*:*:* | ||
cpe:2.3:a:springsource:spring_framework:2.5.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:springsource:spring_framework:2.5.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:springsource:spring_framework:2.5.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:springsource:spring_framework:2.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:springsource:spring_framework:2.5.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:springsource:spring_framework:2.5.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:springsource:spring_framework:2.5.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:springsource:spring_framework:3.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:springsource:spring_framework:3.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:springsource:spring_framework:3.0.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677814
- http://rhn.redhat.com/errata/RHSA-2013-0191.html
- http://rhn.redhat.com/errata/RHSA-2013-0192.html
- http://rhn.redhat.com/errata/RHSA-2013-0193.html
- http://rhn.redhat.com/errata/RHSA-2013-0194.html
- http://rhn.redhat.com/errata/RHSA-2013-0195.html
- http://rhn.redhat.com/errata/RHSA-2013-0196.html
- http://rhn.redhat.com/errata/RHSA-2013-0197.html
- http://rhn.redhat.com/errata/RHSA-2013-0198.html
- http://rhn.redhat.com/errata/RHSA-2013-0221.html
- http://rhn.redhat.com/errata/RHSA-2013-0533.html
- http://secunia.com/advisories/51984
- http://secunia.com/advisories/52054
- http://secunia.com/advisories/55155
- http://support.springsource.com/security/cve-2011-2730
- http://www.debian.org/security/2012/dsa-2504
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.securitytracker.com/id/1029151
- https://docs.google.com/document/d/1dc1xxO8UMFaGLOwgkykYdghGWm_2Gn0iCrxFsympqcE/edit
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677814
- http://rhn.redhat.com/errata/RHSA-2013-0191.html
- http://rhn.redhat.com/errata/RHSA-2013-0192.html
- http://rhn.redhat.com/errata/RHSA-2013-0193.html
- http://rhn.redhat.com/errata/RHSA-2013-0194.html
- http://rhn.redhat.com/errata/RHSA-2013-0195.html
- http://rhn.redhat.com/errata/RHSA-2013-0196.html
- http://rhn.redhat.com/errata/RHSA-2013-0197.html
- http://rhn.redhat.com/errata/RHSA-2013-0198.html
- http://rhn.redhat.com/errata/RHSA-2013-0221.html
- http://rhn.redhat.com/errata/RHSA-2013-0533.html
- http://secunia.com/advisories/51984
- http://secunia.com/advisories/52054
- http://secunia.com/advisories/55155
- http://support.springsource.com/security/cve-2011-2730
- http://www.debian.org/security/2012/dsa-2504
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.securitytracker.com/id/1029151
- https://docs.google.com/document/d/1dc1xxO8UMFaGLOwgkykYdghGWm_2Gn0iCrxFsympqcE/edit