The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-5398

CVE-2020-5398: Spring Framework XSS Vulnerability

CVE-2020-5398 is a reflected file download (RFD) XSS vulnerability in VMware Spring Framework affecting versions 5.2.x, 5.1.x, and 5.0.x. This article covers the technical details, affected versions, and mitigation strategies.

Published: March 4, 2026

CVE-2020-5398 Overview

CVE-2020-5398 is a Reflected File Download (RFD) vulnerability affecting VMware Spring Framework, one of the most widely deployed Java application frameworks. The vulnerability exists in how Spring Framework handles the Content-Disposition HTTP header when the filename attribute is derived from user-supplied input. An attacker can craft malicious URLs that, when accessed by a victim, trigger the download of an executable file with attacker-controlled content, potentially leading to arbitrary code execution on the victim's system.

Reflected File Download attacks are particularly dangerous because they abuse trust relationships between users and legitimate web applications. The attack leverages the victim's browser behavior and the application's response headers to deliver malicious payloads disguised as legitimate downloads from trusted domains.

Critical Impact

This vulnerability allows attackers to execute arbitrary code on victim systems through social engineering, potentially leading to complete system compromise, data theft, and lateral movement within enterprise networks.

Affected Products

  • VMware Spring Framework versions 5.2.x prior to 5.2.3
  • VMware Spring Framework versions 5.1.x prior to 5.1.13
  • VMware Spring Framework versions 5.0.x prior to 5.0.16
  • Oracle WebLogic Server 12.2.1.3.0 and 12.2.1.4.0
  • Oracle MySQL (multiple versions)
  • Oracle Communications products (Element Manager, Session Report Manager, Session Route Manager)
  • Oracle Retail products (multiple versions)
  • NetApp Data Availability Services
  • NetApp SnapCenter

Discovery Timeline

  • January 17, 2020 - CVE-2020-5398 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2020-5398

Vulnerability Analysis

The vulnerability stems from improper handling of user-supplied input when constructing the Content-Disposition HTTP response header in Spring Framework applications. When an application uses user-provided data to populate the filename attribute of this header without proper sanitization, an attacker can manipulate the response to trigger a file download with a malicious filename extension.

This attack exploits a fundamental trust model in web browsers where users are more likely to execute files downloaded from domains they trust. The vulnerability is classified under CWE-79 (Cross-Site Scripting) and CWE-494 (Download of Code Without Integrity Check), reflecting its nature as both an input validation issue and a code integrity problem.

The attack requires user interaction, as the victim must click on the malicious link and subsequently execute the downloaded file. However, the high complexity of exploitation is offset by the significant impact—successful exploitation can lead to full confidentiality, integrity, and availability compromise on the target system.

Root Cause

The root cause of CVE-2020-5398 lies in insufficient input validation and sanitization when Spring Framework applications dynamically construct the Content-Disposition header using user-controlled data. The framework fails to properly validate or encode the filename parameter, allowing attackers to inject malicious filenames with executable extensions (such as .bat, .cmd, .exe, .ps1) into HTTP responses.

When the filename attribute contains special characters or malicious extensions, browsers may interpret the response as a downloadable file with the attacker-specified name, regardless of the actual content type or the legitimacy of the underlying request.

Attack Vector

The attack is conducted over the network and requires user interaction. An attacker constructs a specially crafted URL targeting a vulnerable Spring Framework application endpoint that reflects user input into the Content-Disposition header. The attack flow proceeds as follows:

  1. The attacker identifies an endpoint where user input influences the filename in the Content-Disposition header
  2. A malicious URL is crafted containing a payload that specifies an executable filename
  3. The victim is socially engineered into clicking the link (via phishing, forum posts, or other means)
  4. The vulnerable application responds with a Content-Disposition header containing the malicious filename
  5. The browser prompts the user to download the file with the attacker-controlled name and executable extension
  6. If the victim executes the downloaded file, the attacker's code runs on the victim's system

The vulnerability is exploitable through scenarios where applications provide download functionality with dynamic filenames, file export features, or any endpoint that reflects user input into response headers.

Detection Methods for CVE-2020-5398

Indicators of Compromise

  • Unusual HTTP requests containing executable file extensions (.bat, .cmd, .exe, .ps1) in URL parameters or query strings
  • HTTP responses with Content-Disposition headers containing suspicious or obfuscated filename values
  • User reports of unexpected file download prompts when clicking legitimate application links
  • Web application logs showing requests with encoded special characters targeting download endpoints

Detection Strategies

  • Implement web application firewall (WAF) rules to detect and block requests containing executable extensions in filename parameters
  • Monitor HTTP response headers for anomalous Content-Disposition values, particularly those with non-standard or executable file extensions
  • Deploy endpoint detection solutions to identify and quarantine suspicious files downloaded from trusted enterprise domains
  • Conduct regular application security scans to identify endpoints vulnerable to reflected file download attacks

Monitoring Recommendations

  • Enable detailed logging for all endpoints that generate dynamic Content-Disposition headers
  • Configure SIEM rules to correlate download attempts with subsequent executable file launches on endpoint systems
  • Monitor for social engineering campaigns that may leverage RFD vulnerabilities in your Spring Framework applications
  • Track Spring Framework version usage across the organization to identify systems running vulnerable versions

How to Mitigate CVE-2020-5398

Immediate Actions Required

  • Upgrade VMware Spring Framework to version 5.2.3 or later for the 5.2.x branch
  • Upgrade VMware Spring Framework to version 5.1.13 or later for the 5.1.x branch
  • Upgrade VMware Spring Framework to version 5.0.16 or later for the 5.0.x branch
  • Review all applications for endpoints that dynamically set Content-Disposition headers with user input
  • Apply vendor patches for affected Oracle and NetApp products as referenced in their respective security advisories

Patch Information

VMware has released security patches addressing this vulnerability. Organizations should upgrade to the following minimum versions:

  • Spring Framework 5.2.x: Upgrade to 5.2.3 or later
  • Spring Framework 5.1.x: Upgrade to 5.1.13 or later
  • Spring Framework 5.0.x: Upgrade to 5.0.16 or later

For Oracle products, refer to the Oracle CPU April 2020 Alert and subsequent Critical Patch Updates. For NetApp products, consult the NetApp Advisory NTAP-20210917. The Pivotal CVE-2020-5398 Advisory provides additional technical details and remediation guidance.

Workarounds

  • Implement strict input validation on any user-supplied data used in Content-Disposition headers, rejecting or sanitizing executable file extensions
  • Use allowlist-based filename validation to permit only known-safe file extensions in download responses
  • Configure Content Security Policy (CSP) headers to restrict script execution and provide defense-in-depth against downloaded malicious files
  • Educate users about the risks of executing files downloaded from web applications, even from trusted domains
bash
# Example: Check Spring Framework version in Maven-based projects
grep -r "spring-framework" pom.xml | grep -E "version.*5\.(0\.[0-9]|0\.1[0-5]|1\.[0-9]|1\.1[0-2]|2\.[0-2])"

# Example: Search for vulnerable Content-Disposition usage patterns
grep -rn "Content-Disposition" --include="*.java" src/ | grep -i "filename"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeXSS

  • Vendor/TechVmware Spring Framework

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability90.20%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-79

  • CWE-494
  • Technical References
  • Apache Karaf Issue Thread

  • Apache Karaf Issue Discussion

  • Apache Karaf Commit Notification

  • Apache Karaf Commit Notice

  • Apache Karaf Issue Update

  • Apache Ambari Commit Message

  • Apache Ambari Issue Discussion

  • Apache RocketMQ Development Notification

  • Apache Karaf Issue Commentary

  • Apache Karaf Commit Update

  • Apache Karaf Commit Notification

  • Apache Karaf Issue Report

  • Apache Ambari Issue Report

  • Apache RocketMQ Development Discussion

  • Apache Karaf Commit Notification

  • Apache ServiceComb Commit Message

  • Apache Karaf Issue Update

  • Apache Karaf Commit Notification

  • Apache Karaf Commit Notice

  • Apache Karaf Commit Notification

  • Apache Karaf Issue Discussion

  • Apache ServiceComb Commit Notification

  • Apache Ambari Development Notification

  • Apache Karaf Commit Discussion

  • Apache Ambari Development Update

  • Apache Karaf Issue Report

  • Apache ServiceComb Commit Notice

  • Apache Karaf Issue Notice

  • Apache Geode Development Notification

  • Apache RocketMQ Development Update

  • Apache Geode Development Discussion

  • Apache RocketMQ Development Notice

  • Apache Karaf Commit Notification

  • Apache Camel Commit Update

  • NetApp Advisory NTAP-20210917

  • Oracle CPU April 2020 Alert

  • Oracle CPU January 2021 Alert

  • Oracle CPU July 2020 Alert

  • Oracle CPU July 2022 Alert

  • Oracle CPU October 2020 Alert
  • Vendor Resources
  • Pivotal CVE-2020-5398 Advisory

  • Oracle CPU July 2021 Alert

  • Oracle CPU April 2021 Alert

  • Oracle CPU October 2021 Alert
  • Related CVEs
  • CVE-2022-22965: VMware Spring Framework RCE Vulnerability

  • CVE-2024-38808: VMware Spring Framework DoS Vulnerability

  • CVE-2023-20861: VMware Spring Framework DoS Vulnerability

  • CVE-2023-20860: Spring Framework Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English