VMware

Spring Security

31 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.66%
  • Veröffentlicht 20.02.2024 07:15:09
  • Zuletzt bearbeitet 02.04.2025 20:10:31

In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method. Specificall...

  • EPSS 0.04%
  • Veröffentlicht 05.02.2024 22:15:55
  • Zuletzt bearbeitet 03.06.2025 19:15:32

The spring-security.xsd file inside the spring-security-config jar is world writable which means that if it were extracted it could be written by anyone with access to the file system. While there are no known exploits, this is an example of “CWE...

  • EPSS 49.29%
  • Veröffentlicht 19.07.2023 15:15:11
  • Zuletzt bearbeitet 21.11.2024 08:06:26

Using "**" as a pattern in Spring Security configuration for WebFlux creates a mismatch in pattern matching between Spring Security and Spring WebFlux, and the potential for a security bypass.

Exploit
  • EPSS 2.63%
  • Veröffentlicht 18.07.2023 16:15:11
  • Zuletzt bearbeitet 21.11.2024 08:06:26

Spring Security versions 5.8 prior to 5.8.5, 6.0 prior to 6.0.5, and 6.1 prior to 6.1.2 could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String) and multiple servlets, one of them being Spring MVC’s ...

  • EPSS 0.46%
  • Veröffentlicht 19.04.2023 20:15:10
  • Zuletzt bearbeitet 05.02.2025 16:15:33

In Spring Security, versions 5.7.x prior to 5.7.8, versions 5.8.x prior to 5.8.3, and versions 6.0.x prior to 6.0.3, the logout support does not properly clean the security context if using serialized versions. Additionally, it is not possible to exp...

  • EPSS 7.39%
  • Veröffentlicht 31.10.2022 20:15:12
  • Zuletzt bearbeitet 06.05.2025 16:15:23

Spring Security, versions 5.7 prior to 5.7.5 and 5.6 prior to 5.6.9 could be susceptible to authorization rules bypass via forward or include dispatcher types. Specifically, an application is vulnerable when all of the following are true: The applica...

  • EPSS 0.31%
  • Veröffentlicht 31.10.2022 20:15:12
  • Zuletzt bearbeitet 08.05.2025 19:15:52

Spring Security, versions 5.7 prior to 5.7.5, and 5.6 prior to 5.6.9, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can modify a request initiated by the Client (v...

  • EPSS 90.22%
  • Veröffentlicht 19.05.2022 15:15:08
  • Zuletzt bearbeitet 21.11.2024 06:47:43

In spring security versions prior to 5.4.11+, 5.5.7+ , 5.6.4+ and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular ex...

  • EPSS 0.36%
  • Veröffentlicht 19.05.2022 15:15:08
  • Zuletzt bearbeitet 21.11.2024 06:47:43

Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt roun...

  • EPSS 4.9%
  • Veröffentlicht 29.06.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 05:49:32

Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and We...