Vipin created AMQ-7236:
--------------------------

             Summary: SEV-1 Security vulnerability in 
spring-expression-4.3.11.RELEASE.jar (spring framework) 
                 Key: AMQ-7236
                 URL: https://issues.apache.org/jira/browse/AMQ-7236
             Project: ActiveMQ
          Issue Type: Bug
    Affects Versions: 5.15.9
         Environment: Apache ActiveMQ 5.15.9
            Reporter: Vipin


Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring 
framework) can it be upgraded to spring-expression-5.1.6.RELEASE.jar

SEV-1

[CVE-2018-1270|https://vss.wellsfargo.net/vuln/CVE-2018-1270] (Spring 
Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and 
older unsupported versions, allow applications to expose STOMP over WebSocket 
endpoints with a simple, in-memory STOMP broker through the spring-messaging 
module. A malicious user (or attacker) can craft a message to the broker that 
can lead to a remote code execution attack.)

[CVE-2018-1275|https://vss.wellsfargo.net/vuln/CVE-2018-1275] (Spring 
Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and 
older unsupported versions, allow applications to expose STOMP over WebSocket 
endpoints with a simple, in-memory STOMP broker through the spring-messaging 
module. A malicious user (or attacker) can craft a message to the broker that 
can lead to a remote code execution attack. This CVE addresses the partial fix 
for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.)

 

SEV-2

[CVE-2018-1199|https://vss.wellsfargo.net/vuln/CVE-2018-1199] (Spring Security 
(Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 
5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does 
not consider URL path parameters when processing security constraints. By 
adding a URL path parameter with special encodings, an attacker may be able to 
bypass a security constraint. The root cause of this issue is a lack of clarity 
regarding the handling of path parameters in the Servlet Specification. Some 
Servlet containers include path parameters in the value returned for 
getPathInfo() and some do not. Spring Security uses the value returned by 
getPathInfo() as part of the process of mapping requests to security 
constraints. In this particular attack, different character encodings used in 
path parameters allows secured Spring MVC static resource URLs to be bypassed.)

 



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to