Show filters
220 Total Results
Displaying 51-60 of 220
Sort by:
Attacker Value
Unknown
CVE-2024-22243
Disclosure Date: February 23, 2024 (last updated February 14, 2025)
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.
0
Attacker Value
Unknown
CVE-2024-22234
Disclosure Date: February 20, 2024 (last updated February 14, 2025)
In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method.
Specifically, an application is vulnerable if:
* The application uses AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly and a null authentication parameter is passed to it resulting in an erroneous true return value.
An application is not vulnerable if any of the following is true:
* The application does not use AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly.
* The application does not pass null to AuthenticationTrustResolver.isFullyAuthenticated
* The application only uses isFullyAuthenticated via Method Security https://docs.spring.io/spring-security/reference/servlet/authorization/method-security.html or HTTP Request Security https://docs.spring.io/spring-security/reference/serv…
0
Attacker Value
Unknown
CVE-2024-1635
Disclosure Date: February 19, 2024 (last updated October 22, 2024)
A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available.
At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree l…
0
Attacker Value
Unknown
CVE-2023-34042
Disclosure Date: February 05, 2024 (last updated February 13, 2024)
The spring-security.xsd file inside the
spring-security-config jar is world writable which means that if it were
extracted it could be written by anyone with access to the file system.
While there are no known exploits, this is an example of “CWE-732:
Incorrect Permission Assignment for Critical Resource” and could result
in an exploit. Users should update to the latest version of Spring
Security to mitigate any future exploits found around this issue.
0
Attacker Value
Unknown
CVE-2024-24062
Disclosure Date: February 01, 2024 (last updated February 03, 2024)
springboot-manager v1.6 is vulnerable to Cross Site Scripting (XSS) via /sys/role.
0
Attacker Value
Unknown
CVE-2024-24061
Disclosure Date: February 01, 2024 (last updated February 03, 2024)
springboot-manager v1.6 is vulnerable to Cross Site Scripting (XSS) via /sysContent/add.
0
Attacker Value
Unknown
CVE-2024-24060
Disclosure Date: February 01, 2024 (last updated February 03, 2024)
springboot-manager v1.6 is vulnerable to Cross Site Scripting (XSS) via /sys/user.
0
Attacker Value
Unknown
CVE-2024-24059
Disclosure Date: February 01, 2024 (last updated February 03, 2024)
springboot-manager v1.6 is vulnerable to Arbitrary File Upload. The system does not filter the suffixes of uploaded files.
0
Attacker Value
Unknown
CVE-2024-22236
Disclosure Date: January 31, 2024 (last updated February 09, 2024)
In Spring Cloud Contract, versions 4.1.x prior to 4.1.1, versions 4.0.x prior to 4.0.5, and versions 3.1.x prior to 3.1.10, test execution is vulnerable to local information disclosure via temporary directory created with unsafe permissions through the shaded com.google.guava:guava dependency in the org.springframework.cloud:spring-cloud-contract-shade dependency.
0
Attacker Value
Unknown
CVE-2024-22233
Disclosure Date: January 22, 2024 (last updated February 14, 2025)
In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition.
Specifically, an application is vulnerable when all of the following are true:
* the application uses Spring MVC
* Spring Security 6.1.6+ or 6.2.1+ is on the classpath
Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.
0