[ 
https://issues.apache.org/jira/browse/CXF-8835?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ashok Pai updated CXF-8835:
---------------------------
    Description: 
Spring framework contains a security bypass vulnerability when {{**}} is used 
as a pattern in Spring Security configuration with the {{mvcRequestMatcher}} 
component. The potential for security bypass exists due to the mismatch in 
pattern matching between Spring Security and Spring MVC and this has been fixed 
in 5.3.26.

Apache cxf 3.5.5 is present with spring version 5.3.22. Please provide updated 
Apache CXF with latest (5.3.26) spring framework jars/classes.

 

  was:
There are few vulnerabilities been reported with Spring 5.3.23. Apache cxf 
3.5.5 is present with spring version 5.3.22. Please provide updated Apache CXF 
with latest (5.3.26) spring framework jars/classes.



 


> Upgrade to Spring 5.3.26
> ------------------------
>
>                 Key: CXF-8835
>                 URL: https://issues.apache.org/jira/browse/CXF-8835
>             Project: CXF
>          Issue Type: Improvement
>            Reporter: Ashok Pai
>            Priority: Major
>             Fix For: 3.5.5
>
>
> Spring framework contains a security bypass vulnerability when {{**}} is used 
> as a pattern in Spring Security configuration with the {{mvcRequestMatcher}} 
> component. The potential for security bypass exists due to the mismatch in 
> pattern matching between Spring Security and Spring MVC and this has been 
> fixed in 5.3.26.
> Apache cxf 3.5.5 is present with spring version 5.3.22. Please provide 
> updated Apache CXF with latest (5.3.26) spring framework jars/classes.
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to