In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.

Project Subscriptions

Vendors Products
Oncommand Insight Subscribe
Snap Creator Framework Subscribe
Snapcenter Subscribe
Commerce Guided Search Subscribe
Communications Brm Subscribe
Communications Design Studio Subscribe
Communications Session Report Manager Subscribe
Communications Unified Inventory Management Subscribe
Endeca Information Discovery Integrator Subscribe
Enterprise Data Quality Subscribe
Financial Services Analytical Applications Infrastructure Subscribe
Flexcube Private Banking Subscribe
Fusion Middleware Subscribe
Goldengate Application Adapters Subscribe
Healthcare Master Person Index Subscribe
Hyperion Infrastructure Technology Subscribe
Insurance Policy Administration Subscribe
Insurance Rules Palette Subscribe
Mysql Enterprise Monitor Subscribe
Primavera Gateway Subscribe
Primavera P6 Enterprise Project Portfolio Management Subscribe
Retail Assortment Planning Subscribe
Retail Bulk Data Integration Subscribe
Retail Customer Engagement Subscribe
Retail Customer Management And Segmentation Foundation Subscribe
Retail Financial Integration Subscribe
Retail Integration Bus Subscribe
Retail Invoice Matching Subscribe
Retail Merchandising System Subscribe
Retail Order Broker Subscribe
Retail Predictive Application Server Subscribe
Retail Returns Management Subscribe
Retail Service Backbone Subscribe
Retail Xstore Point Of Service Subscribe
Storagetek Acsls Subscribe
Storagetek Tape Analytics Sw Tool Subscribe
Weblogic Server Subscribe
Jboss Fuse Subscribe
Spring Framework Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rv39-3qh7-9v7w Improper Input Validation in Spring Framework
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163%40%3Ccommits.ambari.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a%40%3Cissues.ambari.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r3589ed0d18edeb79028615080d5a0e8878856436bb91774a3196d9eb%40%3Ccommits.pulsar.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r503e64b43a57fd68229cac4a869d1a9a2eac9e75f8719cad3a840211%40%3Ccommits.pulsar.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5%40%3Cissues.ambari.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r7e6a213eea7f04fc6d9e3bd6eb8d68c4df92a22e956e95cb2c482865%40%3Cissues.hive.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a%40%3Cdev.ambari.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r918caad55dcc640a16753b00d8d6acb90b4e36de4b6156d0867246ec%40%3Ccommits.pulsar.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1%40%3Cdev.ambari.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/ra889d95141059c6cbe77dd80249bb488ae53b274b5f3abad09d9511d%40%3Cuser.ignite.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/raf7ca57033e537e4f9d7df7f192fa6968c1e49409b2348e08d807ccb%40%3Cuser.ignite.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rb18ed999153ef0f0cb7af03efe0046c42c7242fd77fbd884a75ecfdc%40%3Ccommits.pulsar.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rc9efaf6db98bee19db1bc911d0fa442287dac5cb229d4aaa08b6a13d%40%3Cissues.hive.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rd462a8b0dfab4c15e67c0672cd3c211ecd0e4f018f824082ed54f665%40%3Cissues.hive.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/re014a49d77f038ba70e5e9934d400af6653e8c9ac110d32b1254127e%40%3Cdev.ranger.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf00d8f4101a1c1ea4de6ea1e09ddf7472cfd306745c90d6da87ae074%40%3Cdev.hive.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2020-5421 cve-icon
https://security.netapp.com/advisory/ntap-20210513-0009/ cve-icon cve-icon
https://tanzu.vmware.com/security/cve-2020-5421 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2020-5421 cve-icon
https://www.oracle.com//security-alerts/cpujul2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuApr2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2021.html cve-icon cve-icon
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.6708}

epss

{'score': 0.59873}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: pivotal

Published:

Updated: 2024-09-17T03:58:43.873Z

Reserved: 2020-01-03T00:00:00

Link: CVE-2020-5421

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-19T04:15:11.527

Modified: 2024-11-21T05:34:08.303

Link: CVE-2020-5421

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-09-17T00:00:00Z

Links: CVE-2020-5421 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses