cnvd-2018-05368
Vulnerability from cnvd
Title
Spring Security和Spring Framework认证绕过漏洞
Description
Spring Security是一套为基于Spring的应用程序提供说明性安全保护的安全框架。Spring Framework是美国Pivotal公司的一套开源的Java、Java EE应用程序框架。 Spring Security和Spring Framework认证绕过漏洞。远程攻击者可以绕过身份验证,获得对服务器的访问,并且可以公开信息。
Severity
Patch Name
Spring Security和Spring Framework认证绕过漏洞的补丁
Patch Description
Spring Security是一套为基于Spring的应用程序提供说明性安全保护的安全框架。Spring Framework是美国Pivotal公司的一套开源的Java、Java EE应用程序框架。 Spring Security和Spring Framework认证绕过漏洞。远程攻击者可以绕过身份验证,获得对服务器的访问,并且可以公开信息。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可参考如下供应商提供的安全公告获得补丁信息: https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000008.html

Reference
http://jvn.jp/en/jp/JVN15643848/
Impacted products
Name
['Pivotal Software Spring Security >=4.1.0,<=4.1.4', 'Pivotal Software Spring Security >=4.2.0,<=4.2.3', 'Pivotal Software Spring Security 5.0.0', 'Pivotal Software Spring Framework >=4.3.0,<=4.3.13', 'Pivotal Software Spring Framework >=5.0.0,<=5.0.2']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2018-1199"
    }
  },
  "description": "Spring Security\u662f\u4e00\u5957\u4e3a\u57fa\u4e8eSpring\u7684\u5e94\u7528\u7a0b\u5e8f\u63d0\u4f9b\u8bf4\u660e\u6027\u5b89\u5168\u4fdd\u62a4\u7684\u5b89\u5168\u6846\u67b6\u3002Spring Framework\u662f\u7f8e\u56fdPivotal\u516c\u53f8\u7684\u4e00\u5957\u5f00\u6e90\u7684Java\u3001Java EE\u5e94\u7528\u7a0b\u5e8f\u6846\u67b6\u3002\r\n\r\nSpring Security\u548cSpring Framework\u8ba4\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u7ed5\u8fc7\u8eab\u4efd\u9a8c\u8bc1\uff0c\u83b7\u5f97\u5bf9\u670d\u52a1\u5668\u7684\u8bbf\u95ee\uff0c\u5e76\u4e14\u53ef\u4ee5\u516c\u5f00\u4fe1\u606f\u3002",
  "discovererName": "Macchinetta Framework Development Team\uff1aNTT COMWARE, NTT DATA Corporation, and NTT",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000008.html",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2018-05368",
  "openTime": "2018-03-15",
  "patchDescription": "Spring Security\u662f\u4e00\u5957\u4e3a\u57fa\u4e8eSpring\u7684\u5e94\u7528\u7a0b\u5e8f\u63d0\u4f9b\u8bf4\u660e\u6027\u5b89\u5168\u4fdd\u62a4\u7684\u5b89\u5168\u6846\u67b6\u3002Spring Framework\u662f\u7f8e\u56fdPivotal\u516c\u53f8\u7684\u4e00\u5957\u5f00\u6e90\u7684Java\u3001Java EE\u5e94\u7528\u7a0b\u5e8f\u6846\u67b6\u3002\r\n\r\nSpring Security\u548cSpring Framework\u8ba4\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u7ed5\u8fc7\u8eab\u4efd\u9a8c\u8bc1\uff0c\u83b7\u5f97\u5bf9\u670d\u52a1\u5668\u7684\u8bbf\u95ee\uff0c\u5e76\u4e14\u53ef\u4ee5\u516c\u5f00\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Spring Security\u548cSpring Framework\u8ba4\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Pivotal Software Spring Security \u003e=4.1.0\uff0c\u003c=4.1.4",
      "Pivotal Software Spring Security \u003e=4.2.0\uff0c\u003c=4.2.3",
      "Pivotal Software Spring Security 5.0.0",
      "Pivotal Software Spring Framework \u003e=4.3.0\uff0c\u003c=4.3.13",
      "Pivotal Software Spring Framework \u003e=5.0.0\uff0c\u003c=5.0.2"
    ]
  },
  "referenceLink": "http://jvn.jp/en/jp/JVN15643848/",
  "serverity": "\u4e2d",
  "submitTime": "2018-02-05",
  "title": "Spring Security\u548cSpring Framework\u8ba4\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…