CVE-2014-0225 XML External Entity (XXE) injection when using Spring MVC


Severity

Important

Vendor

Spring by Pivotal

Versions Affected
  • Spring MVC 3.0.0 to 3.2.8
  • Spring MVC 4.0.0 to 4.0.4
  • Earlier unsupported versions may be affected
Description

When processing user provided XML documents, the Spring Framework did not disable by default the resolution of URI references in a DTD declaration. This enabled an XXE attack.

Mitigation

Users of affected versions should apply the following mitigation:

  • Users of 3.x should upgrade to 3.2.9 or later
  • Users of 4.x should upgrade to 4.0.5 or later
Credit

This issue was discovered and reported responsibly to the Pivotal security team by Nebula(XIAOBAISHAN,CHIBI,HUBEI.CN) HelloWorld security team, DBappsecurity.com security team.

Additional information demonstrating how a full XXE attack could be made was provided by David Jorm of the RedHat security team.

References
History

2014-May-28: Initial vulnerability report published.

2014-September-05: Updated to add that a full XXE attack is possible and to increase severity from moderate to important as a result.