org.springframework:spring-core@3.0.1.RELEASE vulnerabilities
-
latest version
6.2.0
-
latest non vulnerable version
-
first published
19 years ago
-
latest version published
11 days ago
-
licenses detected
- [0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.springframework:spring-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.springframework:spring-core is a core package within the spring-framework that contains multiple classes and utilities. Affected versions of this package are vulnerable to Improper Handling of Case Sensitivity due to Note: The fix for CVE-2022-22968 made disallowedFields patterns in DataBinder case insensitive. How to fix Improper Handling of Case Sensitivity? Upgrade |
[,6.1.14)
|
org.springframework:spring-core is a core package within the spring-framework that contains multiple classes and utilities. Affected versions of this package are vulnerable to Improper Input Validation when a user provides malicious input, causing insertion of additional log entries. How to fix Improper Input Validation? Upgrade |
[,5.2.19.RELEASE)
[5.3.0,5.3.14)
|
org.springframework:spring-core is a core package within the spring-framework that contains multiple classes and utilities. Affected versions of this package are vulnerable to Improper Output Neutralization for Logs when a user provides malicious input, causing insertion of additional log entries. How to fix Improper Output Neutralization for Logs? Upgrade |
[5.3.0,5.3.12)
[,5.2.18)
|
org.springframework:spring-core is a core package within the spring-framework that contains multiple classes and utilities. Affected versions of this package are vulnerable to Access Restriction Bypass. Remote attackers can bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class. How to fix Access Restriction Bypass? Upgrade |
[3.0.0.RELEASE,3.0.6.RELEASE)
|
org.springframework:spring-core is a core package within the spring-framework that contains multiple classes and utilities. Affected versions of this package are vulnerable to Directory Traversal. It allows remote attackers to read arbitrary files via a crafted URL. How to fix Directory Traversal? Upgrade |
[3.0.0.RELEASE,3.2.9.RELEASE)
[4.0.0.RELEASE,4.0.5.RELEASE)
|
org.springframework:spring-core is a core package within the spring-framework that contains multiple classes and utilities. Affected versions of this package are vulnerable to Expression Language Injection. When a container supports Expression Language (EL), evaluates EL expressions in tags twice, which allows remote attackers to obtain sensitive information via a (1) name attribute in a (a) spring:hasBindErrors tag; (2) path attribute in a (b) spring:bind or (c) spring:nestedpath tag; (3) arguments, (4) code, (5) text, (6) var, (7) scope, or (8) message attribute in a (d) spring:message or (e) spring:theme tag; or (9) var, (10) scope, or (11) value attribute in a (f) spring:transform tag, aka "Expression Language Injection." How to fix Expression Language Injection? Upgrade |
[2.0.0,2.5.6.SEC03)
[3.0.0,3.0.6)
|
org.springframework:spring-core is a core package within the spring-framework that contains multiple classes and utilities. Affected versions of this package are vulnerable to Arbitrary Code Execution,
via an HTTP request containing How to fix Arbitrary Code Execution? Upgrade |
[2.5.0,2.5.6.SEC01)
[3.0.0,3.0.2.RELEASE)
|