This page lists Spring advisories.
CVE-2021-22096: Log Injection in Spring Framework
Description
In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.
Affected Spring Products and Versions
- Spring Framework
- 5.3.0 to 5.3.10
- 5.2.0 to 5.2.17
- Older, unsupported versions are also affected
Mitigation
…
CVE-2021-22097: Spring-AMQP Remote Denial of Service - Deserialization of a Maliciously Constructed java.util.Dictionary Object
CVE-2021-22119: Denial-of-Service (DoS) attack via initiation of Authorization Request in Spring Security OAuth 2.0 Client Web and WebFlux Application
CVE-2021-22118: Local Privilege Escalation within Spring Webflux Multipart Request Handling
Description
In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or modify files that have been uploaded to the WebFlux application, or overwrite arbitrary files with multipart request data.
Spring MVC applications are not affected by this vulnerability, nor are applications that do not handle multipart file requests.
Affected Spring Products and Versions
- Spring Framework
- 5.2.0 to 5.2.14
- 5.3.0 to 5.3.6
Mitigation
Users of affected versions should apply the following mitigation. 5.3.x users should upgrade to 5.3.7. 5.2.x users should upgrade to 5.2.15. No other steps are necessary. Releases that have fixed this issue include:
- Spring Framework
- 5.3.7
- …
CVE-2021-22114: Zip-slip mitigation bypass in Spring Integration Zip extension
CVE-2021-22112: Changing SecurityContext More Than Once in Single Request Can Fail to Save
CVE-2021-22113: Spring Cloud Netflix Zuul “Sensitive Headers” Bypass Vulnerability
CVE-2020-5427: Possibility of SQL Injection in Spring Cloud Data Flow Task Execution Sorting Query
Description
In Spring Cloud Data Flow, versions 2.6.x prior to 2.6.5, versions 2.5.x prior 2.5.4, an application is vulnerable to SQL injection when requesting task execution.
Affected Spring Products and Versions
- Spring Cloud Data Flow
- 2.6.x
- 2.5.x
Mitigation
Users should upgrade to 2.5.4 and higher. Releases that have fixed this issue include:
- Spring Cloud Data Flow
- 2.7.0
- 2.6.5
- …
CVE-2020-5428: Possibility of SQL Injection in Spring Cloud Task Execution Sorting Query
Description
In applications using Spring Cloud Task 2.2.4.RELEASE and below, may be vulnerable to SQL injection when exercising certain lookup queries in the TaskExplorer.
Affected Spring Products and Versions
- Spring Cloud Task
- 2.2.4 and below
Mitigation
Users should upgrade to 2.2.5 and higher. Releases that have fixed this issue include:
- Spring Cloud Task
- 2.3.0
- …
Reporting a vulnerability
To report a security vulnerability for a project within the Spring portfolio, see the Security Policy