Pivotal Software Spring Security 5.2.0 Milestone 4

CPE Details

Pivotal Software Spring Security 5.2.0 Milestone 4
5.2.0
2021-02-24
16h09 +00:00
2021-06-08
16h20 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:pivotal_software:spring_security:5.2.0:milestone4:*:*:*:*:*:*

Informations

Vendor

pivotal_software

Product

spring_security

Version

5.2.0

Update

milestone4

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-22112 2021-02-23 17h48 +00:00 Spring Security 5.4.x prior to 5.4.4, 5.3.x prior to 5.3.8.RELEASE, 5.2.x prior to 5.2.9.RELEASE, and older unsupported versions can fail to save the SecurityContext if it is changed more than once in a single request.A malicious user cannot cause the bug to happen (it must be programmed in). However, if the application's intent is to only allow the user to run with elevated privileges in a small portion of the application, the bug can be leveraged to extend those privileges to the rest of the application.
8.8
Haute
CVE-2020-5408 2020-05-14 17h15 +00:00 Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack.
6.5
Moyen
CVE-2020-5407 2020-05-13 17h00 +00:00 Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2 contain a signature wrapping vulnerability during SAML response validation. When using the spring-security-saml2-service-provider component, a malicious user can carefully modify an otherwise valid SAML response and append an arbitrary assertion that Spring Security will accept as valid.
8.8
Haute
CVE-2018-1258 2018-05-11 20h00 +00:00 Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted.
8.8
Haute