org.springframework.security:spring-security-web@5.8.1 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.springframework.security:spring-security-web package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Authorization Bypass

org.springframework.security:spring-security-web is a package within Spring Security that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Authorization Bypass due to the use of String.toLowerCase() and String.toUpperCase() that have Locale dependent exceptions, which results in authorization rules not working properly.

How to fix Authorization Bypass?

Upgrade org.springframework.security:spring-security-web to version 5.7.14, 5.8.16, 6.2.8, 6.3.5 or higher.

[,5.7.14) [5.8.0,5.8.16) [6.2.0,6.2.8) [6.3.0,6.3.5)
  • C
Missing Authorization

org.springframework.security:spring-security-web is a package within Spring Security that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Missing Authorization allowing Spring Security authorization rules to be bypassed for static resources.

Note:

Spring Security states that for this to impact an application, all of the following must be true:

  1. It must be a WebFlux application.

  2. It must be using Spring's static resources support.

  3. It must have a non-permitAll authorization rule applied to the static resources support.

How to fix Missing Authorization?

Upgrade org.springframework.security:spring-security-web to version 5.7.13, 5.8.15, 6.2.7, 6.3.4 or higher.

[,5.7.13) [5.8.0,5.8.15) [6.0.0,6.2.7) [6.3.0,6.3.4)
  • M
Session Fixation

org.springframework.security:spring-security-web is a package within Spring Security that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Session Fixation due to the logout functionality not properly clearing the security context when using serialized versions. Additionally, it is not possible to explicitly save an empty security context to the HttpSessionSecurityContextRepository. This allows users to stay authenticated after a logout.

NOTE: Applications are only vulnerable if any of the following conditions are true:

  • The SecurityContextHolderFilter or requireExplicitSave(true) is in use with logout support for serialized sessions, and invalidateHttpSession(false).

  • Users are logged out manually by saving an empty SecurityContext into the HttpSessionSecurityContextRepository.

  • A custom SecurityContextRepository is in use that does not rely on the HttpSession.

How to fix Session Fixation?

Upgrade org.springframework.security:spring-security-web to version 5.7.8, 5.8.3, 6.0.3 or higher.

[5.7.0,5.7.8) [5.8.0,5.8.3) [6.0.0,6.0.3)