Get ahead
VMware offers training and certification to turbo-charge your progress.
Learn moreThe JavaScriptUtils.javaScriptEscape() method did not escape all characters that are sensitive within either a JS single quoted string, JS double quoted string, or HTML script data context. In most cases this will result in an unexploitable parse error but in some cases it could result in an XSS vulnerability.
Users of affected versions should apply the following mitigation:
This issue was originally reported to the Spring Framework developers by Jon Passki and the security implications brough to the attention of the Pivotal security team by Arun Neelicattu.
2014-Jan-14: Initial vulnerability report published.
To report a security vulnerability for a project within the Spring portfolio, see the Security Policy