VMware Spring Security 4.0.0 Milestone 1

CPE Details

VMware Spring Security 4.0.0 Milestone 1
4.0.0
2021-06-08
16h11 +00:00
2021-06-08
16h20 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:vmware:spring_security:4.0.0:milestone1:*:*:*:*:*:*

Informations

Vendor

vmware

Product

spring_security

Version

4.0.0

Update

milestone1

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-22978 2022-05-18 22h00 +00:00 In spring security versions prior to 5.4.11+, 5.5.7+ , 5.6.4+ and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
9.8
Critique
CVE-2016-5007 2017-05-25 15h00 +00:00 Both Spring Security 3.2.x, 4.0.x, 4.1.0 and the Spring Framework 3.2.x, 4.0.x, 4.1.x, 4.2.x rely on URL pattern mappings for authorization and for mapping requests to controllers respectively. Differences in the strictness of the pattern matching mechanisms, for example with regards to space trimming in path segments, can lead Spring Security to not recognize certain paths as not protected that are in fact mapped to Spring MVC controllers that should be protected. The problem is compounded by the fact that the Spring Framework provides richer features with regards to pattern matching as well as by the fact that pattern matching in each Spring Security and the Spring Framework can easily be customized creating additional differences.
7.5
Haute