Lucene search

K
githubGitHub Advisory DatabaseGHSA-G5H3-W546-PJ7F
HistoryApr 20, 2023 - 9:33 p.m.

Spring Boot Security Bypass with Wildcard Pattern Matching on Cloud Foundry

2023-04-2021:33:27
GitHub Advisory Database
github.com
190
spring boot
security bypass
cloud foundry
version 3.0.0
version 2.7.0
wildcard pattern matching
upgrade

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.007 Low

EPSS

Percentile

80.7%

In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+.

Affected configurations

Vulners
Node
org.springframework.boot\springMatchboot
OR
org.springframework.boot\springMatchboot
OR
org.springframework.boot\springMatchboot
OR
org.springframework.boot\springMatchboot

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.007 Low

EPSS

Percentile

80.7%