org.springframework:spring-core@6.1.0

  • latest version

    7.0.7

  • latest non vulnerable version

  • first published

    20 years ago

  • latest version published

    6 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.springframework:spring-core package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Allocation of Resources Without Limits or Throttling

    org.springframework:spring-core is a core package within the spring-framework that contains multiple classes and utilities.

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via static resource resolution. An attacker can cause denial of service by sending crafted requests that are slow to resolve when accessing file-system-backed static resources, causing HTTP connections to remain occupied and exhausting server resources.

    Note: This is only exploitable if all the following are true:

    1. The application uses Spring MVC or Spring WebFlux.

    2. Static resources are served from the file system.

    3. The application is running on Windows.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade org.springframework:spring-core to version 6.2.17, 7.0.6 or higher.

    [,6.2.17)[7.0.0-M1,7.0.6)
    • H
    Incorrect Authorization

    org.springframework:spring-core is a core package within the spring-framework that contains multiple classes and utilities.

    Affected versions of this package are vulnerable to Incorrect Authorization via the AnnotationsScanner and AnnotatedMethod class. An attacker can gain unauthorized access to sensitive information by exploiting improper resolution of annotations on methods within type hierarchies that use parameterized supertypes with unbounded generics.

    Note: This is only exploitable if security annotations are used on methods in generic superclasses or generic interfaces and the @EnableMethodSecurity feature is enabled.

    How to fix Incorrect Authorization?

    Upgrade org.springframework:spring-core to version 6.2.11 or higher.

    [,6.2.11)
    • L
    Improper Handling of Case Sensitivity

    org.springframework:spring-core is a core package within the spring-framework that contains multiple classes and utilities.

    Affected versions of this package are vulnerable to Improper Handling of Case Sensitivity due to String.toLowerCase() having some Locale dependent exceptions that could potentially result in fields not protected as expected.

    Note:

    The fix for CVE-2022-22968 made disallowedFields patterns in DataBinder case insensitive.

    This vulnerability was also fixed in commercial versions 5.3.41 and 6.0.25.

    How to fix Improper Handling of Case Sensitivity?

    Upgrade org.springframework:spring-core to version 6.1.14 or higher.

    [,6.1.14)