[ 
https://issues.apache.org/jira/browse/AMQ-7236?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Vipin updated AMQ-7236:
-----------------------
    Description: 
Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring 
framework) can it be upgraded to spring-expression-5.1.6.RELEASE.jar

SEV-1

[CVE-2018-1270|https://vss.wellsfargo.net/vuln/CVE-2018-1270] (Spring 
Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and 
older unsupported versions, allow applications to expose STOMP over WebSocket 
endpoints with a simple, in-memory STOMP broker through the spring-messaging 
module. A malicious user (or attacker) can craft a message to the broker that 
can lead to a remote code execution attack.)

[CVE-2018-1275|https://vss.wellsfargo.net/vuln/CVE-2018-1275] (Spring 
Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and 
older unsupported versions, allow applications to expose STOMP over WebSocket 
endpoints with a simple, in-memory STOMP broker through the spring-messaging 
module. A malicious user (or attacker) can craft a message to the broker that 
can lead to a remote code execution attack. This CVE addresses the partial fix 
for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.)

 

SEV-2

[CVE-2018-1199|https://vss.wellsfargo.net/vuln/CVE-2018-1199] (Spring Security 
(Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 
5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does 
not consider URL path parameters when processing security constraints. By 
adding a URL path parameter with special encodings, an attacker may be able to 
bypass a security constraint. The root cause of this issue is a lack of clarity 
regarding the handling of path parameters in the Servlet Specification. Some 
Servlet containers include path parameters in the value returned for 
getPathInfo() and some do not. Spring Security uses the value returned by 
getPathInfo() as part of the process of mapping requests to security 
constraints. In this particular attack, different character encodings used in 
path parameters allows secured Spring MVC static resource URLs to be bypassed.)

 

SEV2 - for XStream:1.4.10 

[CVE-2013-7285|https://vss.wellsfargo.net/vuln/CVE-2013-7285] (Xstream API 
versions up to 1.4.6 and version 1.4.10, if the security framework has not been 
initialized, may allow a remote attacker to run arbitrary shell commands by 
manipulating the processed input stream when unmarshaling XML or any supported 
format. e.g. JSON.)

 

  was:
Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring 
framework) can it be upgraded to spring-expression-5.1.6.RELEASE.jar

SEV-1

[CVE-2018-1270|https://vss.wellsfargo.net/vuln/CVE-2018-1270] (Spring 
Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and 
older unsupported versions, allow applications to expose STOMP over WebSocket 
endpoints with a simple, in-memory STOMP broker through the spring-messaging 
module. A malicious user (or attacker) can craft a message to the broker that 
can lead to a remote code execution attack.)

[CVE-2018-1275|https://vss.wellsfargo.net/vuln/CVE-2018-1275] (Spring 
Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and 
older unsupported versions, allow applications to expose STOMP over WebSocket 
endpoints with a simple, in-memory STOMP broker through the spring-messaging 
module. A malicious user (or attacker) can craft a message to the broker that 
can lead to a remote code execution attack. This CVE addresses the partial fix 
for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.)

 

SEV-2

[CVE-2018-1199|https://vss.wellsfargo.net/vuln/CVE-2018-1199] (Spring Security 
(Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 
5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does 
not consider URL path parameters when processing security constraints. By 
adding a URL path parameter with special encodings, an attacker may be able to 
bypass a security constraint. The root cause of this issue is a lack of clarity 
regarding the handling of path parameters in the Servlet Specification. Some 
Servlet containers include path parameters in the value returned for 
getPathInfo() and some do not. Spring Security uses the value returned by 
getPathInfo() as part of the process of mapping requests to security 
constraints. In this particular attack, different character encodings used in 
path parameters allows secured Spring MVC static resource URLs to be bypassed.)

 


> SEV-1 Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring 
> framework) and xstream-1.4.10.jar 
> ---------------------------------------------------------------------------------------------------------------
>
>                 Key: AMQ-7236
>                 URL: https://issues.apache.org/jira/browse/AMQ-7236
>             Project: ActiveMQ
>          Issue Type: Bug
>    Affects Versions: 5.15.9
>         Environment: Apache ActiveMQ 5.15.9
>            Reporter: Vipin
>            Priority: Major
>
> Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring 
> framework) can it be upgraded to spring-expression-5.1.6.RELEASE.jar
> SEV-1
> [CVE-2018-1270|https://vss.wellsfargo.net/vuln/CVE-2018-1270] (Spring 
> Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and 
> older unsupported versions, allow applications to expose STOMP over WebSocket 
> endpoints with a simple, in-memory STOMP broker through the spring-messaging 
> module. A malicious user (or attacker) can craft a message to the broker that 
> can lead to a remote code execution attack.)
> [CVE-2018-1275|https://vss.wellsfargo.net/vuln/CVE-2018-1275] (Spring 
> Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and 
> older unsupported versions, allow applications to expose STOMP over WebSocket 
> endpoints with a simple, in-memory STOMP broker through the spring-messaging 
> module. A malicious user (or attacker) can craft a message to the broker that 
> can lead to a remote code execution attack. This CVE addresses the partial 
> fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.)
>  
> SEV-2
> [CVE-2018-1199|https://vss.wellsfargo.net/vuln/CVE-2018-1199] (Spring 
> Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x 
> before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 
> 5.0.3) does not consider URL path parameters when processing security 
> constraints. By adding a URL path parameter with special encodings, an 
> attacker may be able to bypass a security constraint. The root cause of this 
> issue is a lack of clarity regarding the handling of path parameters in the 
> Servlet Specification. Some Servlet containers include path parameters in the 
> value returned for getPathInfo() and some do not. Spring Security uses the 
> value returned by getPathInfo() as part of the process of mapping requests to 
> security constraints. In this particular attack, different character 
> encodings used in path parameters allows secured Spring MVC static resource 
> URLs to be bypassed.)
>  
> SEV2 - for XStream:1.4.10 
> [CVE-2013-7285|https://vss.wellsfargo.net/vuln/CVE-2013-7285] (Xstream API 
> versions up to 1.4.6 and version 1.4.10, if the security framework has not 
> been initialized, may allow a remote attacker to run arbitrary shell commands 
> by manipulating the processed input stream when unmarshaling XML or any 
> supported format. e.g. JSON.)
>  



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to