org.springframework.cloud:spring-cloud-config-server@2.2.4.RELEASE vulnerabilities

  • latest version

    4.2.2

  • latest non vulnerable version

  • first published

    10 years ago

  • latest version published

    11 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.springframework.cloud:spring-cloud-config-server package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Improper Authorization

    org.springframework.cloud:spring-cloud-config-server is a library that provides an HTTP resource-based API for external configuration.

    Affected versions of this package are vulnerable to Improper Authorization due to not using the Vault token sent by clients using a X-CONFIG-TOKEN header when making requests to Vault.

    Note:

    This is only exploitable if all of the following conditions are met:

    1. You have Spring Vault on the classpath of your Spring Cloud Config Server;

    2. You are using the X-CONFIG-TOKEN header to send a Vault token to the Spring Cloud Config Server for the Config Server to use when making requests to Vault;

    3. You are using the default Spring Vault SessionManager implementation LifecycleAwareSessionManager or a SessionManager implementation that persists the Vault token such as SimpleSessionManager.

    How to fix Improper Authorization?

    Upgrade org.springframework.cloud:spring-cloud-config-server to version 3.1.10, 4.1.6, 4.2.2 or higher.

    [2.2.0,3.1.10)[4.0.0,4.1.6)[4.2.0,4.2.2)