Original date: 18.01.2019 (UPDATE)
Overall risk classification: HIGH
Pivotal has published several severe vulnerabilities related to Spring components. Your project may be affected if one of the following components is used: Spring Integration, Spring Web Services, Spring Batch.
Risk: HIGH
All three components are susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
Exploitability: HIGH
Priority (for affected, internet-exposed systems): HIGH
Priority (for internal systems): MEDIUM
If your project uses vulnerable versions of Spring, update these dependencies to the latest versions:
spring-integration-ws, spring-integration-xml to 4.3.19, 5.0.11, 5.1.2 or later
spring-ws, spring-xml jars to 2.4.4, 3.0.6 or later
spring-batch jars to 3.0.10, 4.0.2, 4.1.1 or later
The components that exhibited this vulnerability now disable the features by default, but allow user configuration of the components if the feature can be enabled because XML is received from a trusted source.
Martin Schöne
[1] https://pivotal.io/security/cve-2019-3772
[2] https://pivotal.io/security/cve-2019-3773
[3] https://pivotal.io/security/cve-2019-3774