org.springframework.grpc:spring-grpc-core@1.0.1

  • latest version

    1.0.3

  • latest non vulnerable version

  • first published

    1 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.springframework.grpc:spring-grpc-core package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • L
    Improper Isolation or Compartmentalization

    Affected versions of this package are vulnerable to Improper Isolation or Compartmentalization due to improper isolation of the SecurityContext. When an authenticated user experiences an authorization failure, their security context is not properly cleared from the underlying gRPC worker thread. If a subsequent unauthenticated request is processed by this exact same thread, it can inadvertently inherit the previous user's authenticated identity. This flaw allows an unauthenticated attacker to bypass security controls and perform unauthorized actions.

    How to fix Improper Isolation or Compartmentalization?

    Upgrade org.springframework.grpc:spring-grpc-core to version 1.0.3 or higher.

    [,1.0.3)
    • M
    Generation of Error Message Containing Sensitive Information

    Affected versions of this package are vulnerable to Generation of Error Message Containing Sensitive Information due to the raw message of every server-side AuthenticationException being returned to the unauthenticated remote caller in the gRPC status description. This allows an attacker to obtain information about the authentication failure, which may be useful for further attacks.

    How to fix Generation of Error Message Containing Sensitive Information?

    Upgrade org.springframework.grpc:spring-grpc-core to version 1.0.3 or higher.

    [,1.0.3)