CVE-2014-0225 XML External Entity (XXE) injection when using Spring MVC

HIGH | MAY 28, 2014 | CVE-2014-0225

Description

When processing user provided XML documents, the Spring Framework did not disable by default the resolution of URI references in a DTD declaration. This enabled an XXE attack.

Affected Spring Products and Versions

  • Spring MVC 3.0.0 to 3.2.8
  • Spring MVC 4.0.0 to 4.0.4
  • Earlier unsupported versions may be affected

Mitigation

Users of affected versions should apply the following mitigation:

  • Users of 3.x should upgrade to 3.2.9 or later
  • Users of 4.x should upgrade to 4.0.5 or later

Credit

This issue was discovered and reported responsibly to the Pivotal security team by Nebula(XIAOBAISHAN,CHIBI,HUBEI.CN) HelloWorld security team, DBappsecurity.com security team. Additional information demonstrating how a full XXE attack could be made was provided by David Jorm of the RedHat security team.

References

History

2014-May-28: Initial vulnerability report published.

  • 2014-September-05: Updated to add that a full XXE attack is possible and to increase severity from moderate to important as a result.

Get ahead

VMware offers training and certification to turbo-charge your progress.

Learn more

Get support

Tanzu Spring offers support and binaries for OpenJDK™, Spring, and Apache Tomcat® in one simple subscription.

Learn more

Upcoming events

Check out all the upcoming events in the Spring community.

View all