6.4.2
16 years ago
1 months ago
Known vulnerabilities in the org.springframework.security:spring-security-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform. Affected versions of this package are vulnerable to Authorization Bypass due to the use of How to fix Authorization Bypass? Upgrade | [,5.7.14)[5.8.0,5.8.16)[6.2.0,6.2.8)[6.3.0,6.3.5) |
org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform. Affected versions of this package are vulnerable to Improper Access Control when the application uses Note Users are not affected if:
How to fix Improper Access Control? Upgrade | [,5.7.12)[5.8.0,5.8.11)[6.0.0,6.0.10)[6.1.0,6.1.8)[6.2.0,6.2.3) |
org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform. Affected versions of this package are vulnerable to Privilege Escalation. It fails to save the How to fix Privilege Escalation? Upgrade | [5.4.0,5.4.4)[5.3.0.RELEASE,5.3.8.RELEASE)[,5.2.9.RELEASE) |
org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform. Affected versions of this package are vulnerable to Information Exposure. How to fix Information Exposure? Upgrade | [,2.0.8.RELEASE)[3.0.0.RELEASE,3.0.8.RELEASE)[3.1.0.RELEASE,3.1.3.RELEASE) |
org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform. Affected versions of this package are vulnerable to Access Restriction Bypass. Spring Security allows remote attackers to bypass security constraints via a path parameter. How to fix Access Restriction Bypass? Upgrade | [2.0.0.RELEASE,2.0.6.RELEASE)[3.0.0..RELEASE,3.0.4.RELEASE) |
| [,2.0.7.RELEASE)[3.0.0.RELEASE,3.0.6.RELEASE) |
org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform. Affected versions of this package are vulnerable to Arbitrary Code Execution. CRLF injection vulnerability in the logout functionality in VMware SpringSource Spring Security before 2.0.7 and 3.0.x before 3.0.6 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the spring-security-redirect parameter. How to fix Arbitrary Code Execution? Upgrade | [2.0.0,2.0.7.RELEASE)[3.0.0.RELEASE,3.0.6.RELEASE) |
org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform. Affected versions of this package are vulnerable to Access Restriction Bypass. Remote attackers can bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class. How to fix Access Restriction Bypass? Upgrade | [2.0.0.RELEASE,2.0.7.RELEASE)[3.0.0.RELEASE,3.0.6.RELEASE) |