5
CVSSv2

CVE-2018-1199

Published: 16/03/2018 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Spring Security (Spring Security 4.1.x prior to 4.1.5, 4.2.x prior to 4.2.4, and 5.0.x prior to 5.0.1; and Spring Framework 4.3.x prior to 4.3.14 and 5.0.x prior to 5.0.3) does not consider URL path parameters when processing security constraints. By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification. Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. In this particular attack, different character encodings used in path parameters allows secured Spring MVC static resource URLs to be bypassed.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware spring framework

vmware spring security

redhat fuse 1.0

oracle retail xstore point of service 7.1

oracle rapid planning 12.1

oracle rapid planning 12.2

Vendor Advisories

Synopsis Critical: Red Hat FIS 20 on Fuse 630 R7 security and bug fix update Type/Severity Security Advisory: Critical Topic An update is now available for Red Hat Fuse Integration ServicesRed Hat Product Security has rated this update as having a security impact of Critical A Common Vulnerability Scor ...
Spring Security (Spring Security 41x before 415, 42x before 424, and 50x before 501; and Spring Framework 43x before 4314 and 50x before 503) does not consider URL path parameters when processing security constraints By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint ...