org.springframework.security:spring-security-config@5.8.1 vulnerabilities
-
latest version
6.3.3
-
latest non vulnerable version
-
first published
15 years ago
-
latest version published
3 months ago
-
licenses detected
- [3.0.0.RELEASE,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.springframework.security:spring-security-config package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.springframework.security:spring-security-config is a security configuration package for Spring Framework. Affected versions of this package are vulnerable to Authorization Bypass due to the use of How to fix Authorization Bypass? Upgrade |
[,5.7.14)
[5.8.0,5.8.16)
[6.2.0,6.2.8)
[6.3.0,6.3.5)
|
org.springframework.security:spring-security-config is a security configuration package for Spring Framework. Affected versions of this package are vulnerable to Access Control Bypass. When using Note: The fixed versions require Spring Framework versions:
Note: The Spring security team have published information about an existing PoC, but have not shared the PoC itself publicly, therefore we don't currently have the ability to verify it. How to fix Access Control Bypass? Upgrade |
[5.6.0,5.6.12)
[5.7.0,5.7.10)
[5.8.0,5.8.5)
[6.0.0,6.0.5)
[6.1.0,6.1.2)
|
org.springframework.security:spring-security-config is a security configuration package for Spring Framework. Affected versions of this package are vulnerable to Improper Authorization due to improper validation in the Notes: An application is only vulnerable when all of the following are true:
How to fix Improper Authorization? Upgrade |
[5.8.0,5.8.5)
[6.0.0,6.0.5)
[6.1.0,6.1.2)
|
org.springframework.security:spring-security-config is a security configuration package for Spring Framework. Affected versions of this package are vulnerable to Session Fixation due to the logout functionality not properly clearing the security context when using serialized versions. Additionally, it is not possible to explicitly save an empty security context to the NOTE: Applications are only vulnerable if any of the following conditions are true:
How to fix Session Fixation? Upgrade |
[5.7.0,5.7.8)
[5.8.0,5.8.3)
[6.0.0,6.0.3)
|