This page lists Spring advisories.
CVE-2023-20860: Security Bypass With Un-Prefixed Double Wildcard Pattern
Description
Using "**"
as a pattern in Spring Security configuration with the mvcRequestMatcher
creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.
Affected Spring Products and Versions
- Spring Framework:
- 6.0.0 to 6.0.6
- 5.3.0 to 5.3.25
- Versions older than 5.3 are not affected
…
CVE-2023-20859: Insertion of Sensitive Information into Log Sourced from Failed Revocation of Tokens
Description
In Spring Vault, versions 3.0.x prior to 3.0.2 and versions 2.3.x prior to 2.3.3 and older versions, an application is vulnerable to insertion of sensitive information into a log file when it attempts to revoke a Vault batch token.
Specifically, an application is vulnerable when all of the following are true:
- The authentication mechanism creates Batch tokens.
- Usage of
LifecycleAwareSessionManager
in an imperative-only arrangement. LifecycleAwareSessionManager.destroy()
is called by the application or the application shutdown hook- The logging level for
LifecycleAwareSessionManager
ororg.springframework.vault.authentication
is set at least toWARN
…
CVE-2023-20861: Spring Expression DoS Vulnerability
CVE-2022-31691: Remote Code Execution via YAML editors in STS4 extensions for Eclipse and VSCode
CVE-2022-31692: Authorization rules can be bypassed via forward or include dispatcher types in Spring Security
CVE-2022-31690: Privilege Escalation in spring-security-oauth2-client
CVE-2022-31684: Reactor Netty HTTP Server may log request headers
CVE-2022-31679: Potential Unintended Data Exposure for Resource Exposed by Spring Data REST
CVE-2022-22980: Spring Data MongoDB SpEL Expression injection vulnerability through annotated repository query methods
Reporting a vulnerability
To report a security vulnerability for a project within the Spring portfolio, see the Security Policy