org.springframework.boot:spring-boot-actuator-autoconfigure@2.6.2 vulnerabilities

  • latest version

    3.4.1

  • latest non vulnerable version

  • first published

    6 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.springframework.boot:spring-boot-actuator-autoconfigure package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Access Restriction Bypass

    Affected versions of this package are vulnerable to Access Restriction Bypass due to improper implementation of wildcard pattern matching.

    An application is vulnerable when all of the following are true:

    1. Users have code that can handle requests matching /cloudfoundryapplication/**. Typically, this will be if there is a catch-all request mapping which matches /**

    2. The application is deployed to Cloud Foundry.

    Note: Applications using Spring Cloud Config Server can handle requests to /cloudfoundryapplication/** by default and can be vulnerable if deployed to Cloud Foundry.

    An application is not vulnerable if any of the following is true:

    1. The application is not deployed to Cloud Foundry

    2. Users have disabled Cloud Foundry actuator endpoints with management.cloudfoundry.enabled set to false

    3. The application does not have handler mappings that can handle requests to /cloudfoundryapplication/**

    How to fix Access Restriction Bypass?

    Upgrade org.springframework.boot:spring-boot-actuator-autoconfigure to version 2.5.15, 2.6.15, 2.7.11, 3.0.6 or higher.

    [,2.5.15)[2.6.0,2.6.15)[2.7.0,2.7.11)[3.0.0,3.0.6)