Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.springframework.security/spring-security-core@5.3.0
purl pkg:maven/org.springframework.security/spring-security-core@5.3.0
Tags Ghost
Next non-vulnerable version 5.7.14
Latest non-vulnerable version 6.5.4
Risk 4.0
Vulnerabilities affecting this package (4)
Vulnerability Summary Fixed by
VCID-hedq-eav6-4fee
Aliases:
CVE-2020-5408
GHSA-2ppp-9496-p23q
Insufficient Entropy in Spring Security Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack.
5.3.2
Affected by 0 other vulnerabilities.
5.3.2.RELEASE
Affected by 5 other vulnerabilities.
VCID-y1m6-bc5x-1bbb
Aliases:
CVE-2020-5407
GHSA-48rw-j489-928m
Signature wrapping vulnerability in Spring Security Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2 contain a signature wrapping vulnerability during SAML response validation. When using the spring-security-saml2-service-provider component, a malicious user can carefully modify an otherwise valid SAML response and append an arbitrary assertion that Spring Security will accept as valid.
5.3.2
Affected by 0 other vulnerabilities.
5.3.2.RELEASE
Affected by 5 other vulnerabilities.
VCID-yeaf-ta2h-p7c1
Aliases:
CVE-2021-22112
GHSA-gq28-h5vg-8prx
Privilege escalation in spring security Spring Security 5.4.x prior to 5.4.4, 5.3.x prior to 5.3.8.RELEASE, 5.2.x prior to 5.2.9.RELEASE, and older unsupported versions can fail to save the SecurityContext if it is changed more than once in a single request.A malicious user cannot cause the bug to happen (it must be programmed in). However, if the application's intent is to only allow the user to run with elevated privileges in a small portion of the application, the bug can be leveraged to extend those privileges to the rest of the application.
5.3.9
Affected by 1 other vulnerability.
5.3.9.RELEASE
Affected by 4 other vulnerabilities.
5.4.4
Affected by 4 other vulnerabilities.
VCID-ykkv-ahjn-d7eb
Aliases:
CVE-2021-22119
GHSA-w9jg-gvgr-354m
Incorrect Authorization Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions.
5.3.10
Affected by 0 other vulnerabilities.
5.3.10.RELEASE
Affected by 3 other vulnerabilities.
5.4.7
Affected by 3 other vulnerabilities.
5.5.1
Affected by 3 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.