Get ahead
VMware offers training and certification to turbo-charge your progress.
Learn moreWhen a programmer does not specify the action on the Spring form, Spring automatically populates the action field with the requested uri. An attacker can use this to inject malicious content into the form.
Users of affected versions should apply the following mitigation:
This issue was discovered and reported responsibly to the Pivotal security team by Paul Wowk of CAaNES LLC.
2014-Mar-11: Initial vulnerability report published.
To report a security vulnerability for a project within the Spring portfolio, see the Security Policy