Pivotal Software Spring Security 5.3.0

CPE Details

Pivotal Software Spring Security 5.3.0
5.3.0
2021-02-24
16h17 +00:00
2021-07-08
10h39 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:pivotal_software:spring_security:5.3.0:-:*:*:*:*:*:*

Informations

Vendor

pivotal_software

Product

spring_security

Version

5.3.0

Update

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-22112 2021-02-23 17h48 +00:00 Spring Security 5.4.x prior to 5.4.4, 5.3.x prior to 5.3.8.RELEASE, 5.2.x prior to 5.2.9.RELEASE, and older unsupported versions can fail to save the SecurityContext if it is changed more than once in a single request.A malicious user cannot cause the bug to happen (it must be programmed in). However, if the application's intent is to only allow the user to run with elevated privileges in a small portion of the application, the bug can be leveraged to extend those privileges to the rest of the application.
8.8
High
CVE-2020-5408 2020-05-14 17h15 +00:00 Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack.
6.5
Medium
CVE-2020-5407 2020-05-13 17h00 +00:00 Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2 contain a signature wrapping vulnerability during SAML response validation. When using the spring-security-saml2-service-provider component, a malicious user can carefully modify an otherwise valid SAML response and append an arbitrary assertion that Spring Security will accept as valid.
8.8
High
CVE-2018-1258 2018-05-11 20h00 +00:00 Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted.
8.8
High