漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification. Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. In this particular attack, different character encodings used in path parameters allows secured Spring MVC static resource URLs to be bypassed.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Pivotal Spring Security和Spring Framework 安全漏洞
Vulnerability Description
Pivotal Spring Security和Spring Framework都是美国Pivotal Software公司的产品。Pivotal Spring Security是一套为基于Spring的应用程序提供说明性安全保护的安全框架。Spring Framework是一套开源的Java、Java EE应用程序框架。 Pivotal Spring Security和Spring Framework中存在安全漏洞。攻击者可利用该漏洞绕过安全限制。以下产品和版本受到影响:Spring Security
CVSS Information
N/A
Vulnerability Type
N/A