Vulnerability Name: CVE-2020-5421 (CCN-188530) Assigned: 2020-09-17 Published: 2020-09-17 Updated: 2023-03-01 Summary: VMware Tanzu Spring Framework could allow a remote attacker to bypass security restrictions, caused by improper input validation. By using a specially-crafted jsessionid path parameter, an attacker could exploit this vulnerability to bypass RFD Protection. CVSS v3 Severity: 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N )5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): LowUser Interaction (UI): RequiredScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): LowIntegrity (I): HighAvailibility (A): None
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N )4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): LowAvailibility (A): None
CVSS v2 Severity: 3.6 Low (CVSS v2 Vector: AV:N/AC:H/Au:S/C:P/I:P/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAuthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): None
Vulnerability Consequences: Bypass Security References: Source: MITRE Type: CNACVE-2020-5421 Source: XF Type: UNKNOWNvamware-cve20205421-sec-bypass(188530) Source: security@pivotal.io Type: Mailing List, Patch, Third Party Advisorysecurity@pivotal.io Source: security@pivotal.io Type: Mailing List, Third Party Advisorysecurity@pivotal.io Source: security@pivotal.io Type: Mailing List, Third Party Advisorysecurity@pivotal.io Source: security@pivotal.io Type: Mailing List, Third Party Advisorysecurity@pivotal.io Source: security@pivotal.io Type: Mailing List, Third Party Advisorysecurity@pivotal.io Source: security@pivotal.io Type: Mailing List, Third Party Advisorysecurity@pivotal.io Source: security@pivotal.io Type: Mailing List, Third Party Advisorysecurity@pivotal.io Source: security@pivotal.io Type: Mailing List, Third Party Advisorysecurity@pivotal.io Source: security@pivotal.io Type: Mailing List, Third Party Advisorysecurity@pivotal.io Source: security@pivotal.io Type: Mailing List, Third Party Advisorysecurity@pivotal.io Source: security@pivotal.io Type: Mailing List, Third Party Advisorysecurity@pivotal.io Source: security@pivotal.io Type: Mailing List, Third Party Advisorysecurity@pivotal.io Source: security@pivotal.io Type: Mailing List, Third Party Advisorysecurity@pivotal.io Source: security@pivotal.io Type: Mailing List, Third Party Advisorysecurity@pivotal.io Source: security@pivotal.io Type: Mailing List, Third Party Advisorysecurity@pivotal.io Source: security@pivotal.io Type: Mailing List, Third Party Advisorysecurity@pivotal.io Source: security@pivotal.io Type: Third Party Advisorysecurity@pivotal.io Source: CCN Type: VMware Tanzu Web siteCVE-2020-5421: RFD Protection Bypass via jsessionid Source: security@pivotal.io Type: Vendor Advisorysecurity@pivotal.io Source: CCN Type: IBM Security Bulletin 6383076 (Watson Speech Services for Cloud Pak for Data)Spring Framework vulnerabilities affect IBM Watson Text to Speech and Speech to Text (IBM Watson Speech Services for Cloud Pak for Data 1.2) Source: CCN Type: IBM Security Bulletin 6398694 (Tivoli Application Dependency Discovery Manager)A vulnerability in Spring Framework affects IBM Tivoli Application Dependency Discovery Manager (CVE-2020-5421). Source: CCN Type: IBM Security Bulletin 6406292 (Rational Test Virtualization Server)Rational Test Control Panel affected by Spring Framework vulnerability Source: CCN Type: IBM Security Bulletin 6408868 (QRadar SIEM)Spring Framework as used by IBM QRadar SIEM is vulnerable to improper input validation (CVE-2020-5421) Source: CCN Type: IBM Security Bulletin 6410788 (Data Risk Manager)IBM Data Risk Manager is affected by multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6416129 (Watson Discovery)IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in Spring Source: CCN Type: IBM Security Bulletin 6443419 (Security Guardium)IBM Security Guardium is affected by a Spring Framework vulnerability Source: CCN Type: IBM Security Bulletin 6453447 (Control Center)Security Bypass Vulnerability in Spring Framework Affects IBM Control Center (CVE-2020-5421) Source: CCN Type: IBM Security Bulletin 6505281 (Cloud Pak for Security)IBM Security Risk Manager on CP4S is affected by multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6570915 (Data Risk Manager)IBM Data Risk Manager is affected by multiple vulnerabilities including a remote code execution in Spring Framework (CVE-2022-22965) Source: CCN Type: IBM Security Bulletin 6570969 (Sterling B2B Integrator)IBM Sterling B2B Integrator vulnerable to multiple vulnerabilities due to Spring Framework Source: CCN Type: IBM Security Bulletin 6610851 (Cloud Pak System)Vulnerabilities in Spring Framework affect IBM Cloud Pak System (CVE-2022-22965, CVE-2020-5421) Source: security@pivotal.io Type: Patch, Third Party Advisorysecurity@pivotal.io Source: CCN Type: Oracle Critical Patch Update Advisory - April 2021Oracle Critical Patch Update Advisory - April 2021 Source: security@pivotal.io Type: Patch, Third Party Advisorysecurity@pivotal.io Source: CCN Type: Oracle CPUApr2022Oracle Critical Patch Update Advisory - April 2022 Source: security@pivotal.io Type: Patch, Third Party Advisorysecurity@pivotal.io Source: CCN Type: Oracle CPUJan2021Oracle Critical Patch Update Advisory - January 2021 Source: security@pivotal.io Type: Patch, Third Party Advisorysecurity@pivotal.io Source: CCN Type: Oracle CPUJan2022Oracle Critical Patch Update Advisory - January 2022 Source: security@pivotal.io Type: Patch, Third Party Advisorysecurity@pivotal.io Source: CCN Type: Oracle CPUJul2021Oracle Critical Patch Update Advisory - July 2021 Source: security@pivotal.io Type: Not Applicable, Third Party Advisorysecurity@pivotal.io Vulnerable Configuration: Configuration CCN 1 :cpe:/a:pivotal_software:spring_framework:5.2.8:*:*:*:*:*:*:* AND cpe:/a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_order_broker_cloud_service:15.0:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_order_broker_cloud_service:16.0:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_predictive_application_server:14.1:*:*:*:*:*:*:* OR cpe:/a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:flexcube_private_banking:12.0:*:*:*:*:*:*:* OR cpe:/a:oracle:flexcube_private_banking:12.1:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_invoice_matching:14.0:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_invoice_matching:14.1:*:*:*:*:*:*:* OR cpe:/a:oracle:fusion_middleware:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:enterprise_data_quality:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3.0:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_system:2.3.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:watson_discovery:2.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.3.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_system:2.3.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.1:*:*:*:*:*:*:* OR cpe:/a:ibm:data_risk_manager:2.0.6:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_system:2.3.2.0:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4.0:-:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.2:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3.3:p5:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4.1:patch1:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_system:2.3.3.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_system:2.3.3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_system:2.3.3.2:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.1.0.0:*:*:*:standard:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4.2:p1:*:*:*:*:*:* OR cpe:/a:ibm:control_center:6.2.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:watson_discovery:2.2.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_system:2.3.3.3:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.3:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_security:1.7.2.0:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.0.3.5:*:*:*:standard:*:*:* Denotes that component is vulnerable BACK
pivotal_software spring framework 5.2.8
oracle weblogic server 10.3.6.0.0
oracle weblogic server 12.1.3.0.0
oracle retail order broker cloud service 15.0
oracle retail order broker cloud service 16.0
oracle retail predictive application server 14.1
oracle weblogic server 12.2.1.3.0
oracle flexcube private banking 12.0
oracle flexcube private banking 12.1
oracle retail invoice matching 14.0
oracle retail invoice matching 14.1
oracle fusion middleware 12.2.1.3.0
oracle enterprise data quality 12.2.1.3.0
ibm qradar security information and event manager 7.3.0
ibm sterling b2b integrator 6.0.0.0
oracle communications unified inventory management 7.3.4
oracle communications unified inventory management 7.3.5
ibm cloud pak system 2.3.0.1
ibm watson discovery 2.0.0
ibm tivoli application dependency discovery manager 7.3.0.0
ibm security guardium 11.0
ibm cloud pak system 2.3.1.1
ibm security guardium 11.1
ibm data risk manager 2.0.6
ibm cloud pak system 2.3.2.0
ibm qradar security information and event manager 7.4.0
ibm security guardium 11.2
ibm qradar security information and event manager 7.3.3 p5
ibm qradar security information and event manager 7.4.1 patch1
ibm cloud pak system 2.3.3.0
ibm cloud pak system 2.3.3.1
ibm cloud pak system 2.3.3.2
ibm sterling b2b integrator 6.1.0.0
ibm qradar security information and event manager 7.4.2 p1
ibm control center 6.2.0.0
ibm watson discovery 2.2.0
ibm cloud pak system 2.3.3.3
ibm security guardium 11.3
ibm cloud pak for security 1.7.2.0
ibm sterling b2b integrator 6.0.3.5