Show filters
220 Total Results
Displaying 51-60 of 220
Sort by:
Attacker Value
Unknown

CVE-2024-22243

Disclosure Date: February 23, 2024 (last updated February 14, 2025)
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks.
0
Attacker Value
Unknown

CVE-2024-22234

Disclosure Date: February 20, 2024 (last updated February 14, 2025)
In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method. Specifically, an application is vulnerable if: * The application uses AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly and a null authentication parameter is passed to it resulting in an erroneous true return value. An application is not vulnerable if any of the following is true: * The application does not use AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly. * The application does not pass null to AuthenticationTrustResolver.isFullyAuthenticated * The application only uses isFullyAuthenticated via Method Security https://docs.spring.io/spring-security/reference/servlet/authorization/method-security.html  or HTTP Request Security https://docs.spring.io/spring-security/reference/serv…
0
Attacker Value
Unknown

CVE-2024-1635

Disclosure Date: February 19, 2024 (last updated October 22, 2024)
A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available. At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree l…
0
Attacker Value
Unknown

CVE-2023-34042

Disclosure Date: February 05, 2024 (last updated February 13, 2024)
The spring-security.xsd file inside the spring-security-config jar is world writable which means that if it were extracted it could be written by anyone with access to the file system. While there are no known exploits, this is an example of “CWE-732: Incorrect Permission Assignment for Critical Resource” and could result in an exploit. Users should update to the latest version of Spring Security to mitigate any future exploits found around this issue.
Attacker Value
Unknown

CVE-2024-24062

Disclosure Date: February 01, 2024 (last updated February 03, 2024)
springboot-manager v1.6 is vulnerable to Cross Site Scripting (XSS) via /sys/role.
Attacker Value
Unknown

CVE-2024-24061

Disclosure Date: February 01, 2024 (last updated February 03, 2024)
springboot-manager v1.6 is vulnerable to Cross Site Scripting (XSS) via /sysContent/add.
Attacker Value
Unknown

CVE-2024-24060

Disclosure Date: February 01, 2024 (last updated February 03, 2024)
springboot-manager v1.6 is vulnerable to Cross Site Scripting (XSS) via /sys/user.
Attacker Value
Unknown

CVE-2024-24059

Disclosure Date: February 01, 2024 (last updated February 03, 2024)
springboot-manager v1.6 is vulnerable to Arbitrary File Upload. The system does not filter the suffixes of uploaded files.
Attacker Value
Unknown

CVE-2024-22236

Disclosure Date: January 31, 2024 (last updated February 09, 2024)
In Spring Cloud Contract, versions 4.1.x prior to 4.1.1, versions 4.0.x prior to 4.0.5, and versions 3.1.x prior to 3.1.10, test execution is vulnerable to local information disclosure via temporary directory created with unsafe permissions through the shaded com.google.guava:guava dependency in the org.springframework.cloud:spring-cloud-contract-shade dependency.
Attacker Value
Unknown

CVE-2024-22233

Disclosure Date: January 22, 2024 (last updated February 14, 2025)
In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.