The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade org.springframework.security:spring-security-web
to version 5.6.9, 5.7.5 or higher.
org.springframework.security:spring-security-web is a package within Spring Security that provides security services for the Spring IO Platform.
Affected versions of this package are vulnerable to Authorization Bypass via forward or include dispatcher types.
An application is vulnerable when all of the following are true
:
The application expects that Spring Security applies security to forward and include dispatcher types.
The application uses the AuthorizationFilter
either manually or via the authorizeHttpRequests()
method.
The application configures the FilterChainProxy
to apply to forward and/or include requests (e.g. spring.security.filter.dispatcher-types = request, error, async, forward, include
).
The application may forward or include the request to a higher privilege-secured endpoint.
The application configures Spring Security to apply to every dispatcher type via authorizeHttpRequests().shouldFilterAllDispatcherTypes(true)
An application is not vulnerable if any of the following is true:
The application does not use authorizeHttpRequests()
or the AuthorizationFilter
.
The application does not forward/include requests.
The application does not need to configure Spring Security to apply to FORWARD
and INCLUDE
dispatcher types.
Users who are unable to upgrade should use AuthorizeRequests().filterSecurityInterceptorOncePerRequest(false)
instead of AuthorizeHttpRequests().shouldFilterAllDispatcherTypes(true)
.
Users with version < 5.7.0 which does not have shouldFilterAllDispatcherTypes
available, should add an ObjectPostProcessor
:
authorizeHttpRequests().withObjectPostProcessor(new
ObjectPostProcessor<AuthorizationFilter>() {
@Override
public<O extends AuthorizationFilter> O postProcess(O filter) {
filter.setObserveOncePerRequest(false);
filter.setFilterAsyncDispatch(true);
filter.setFilterErrorDispatch(true);
return filter;
}});
Note:
In Spring Security 5, the default behavior is to not apply the filters more than once to a request, therefore users have to explicitly configure Spring Security to do that. In addition, the FilterChainProxy
is also not configured to be invoked on forward
and include
dispatcher types.