-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(deps): update dependency org.springframework:spring-core to v4 [security] - autoclosed #75
Closed
renovate
wants to merge
1
commit into
master
from
renovate/maven-org.springframework-spring-core-vulnerability
Closed
fix(deps): update dependency org.springframework:spring-core to v4 [security] - autoclosed #75
renovate
wants to merge
1
commit into
master
from
renovate/maven-org.springframework-spring-core-vulnerability
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ecfc7e0
to
1556b46
Compare
1556b46
to
2d62d78
Compare
2d62d78
to
3c5cc69
Compare
3c5cc69
to
cf9c82a
Compare
cf9c82a
to
81f292e
Compare
81f292e
to
10d706a
Compare
10d706a
to
f385c70
Compare
f385c70
to
9bea1bc
Compare
9bea1bc
to
9da775a
Compare
9da775a
to
9d826e7
Compare
9d826e7
to
9a75f40
Compare
9a75f40
to
d4a2a8f
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
None yet
0 participants
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
3.2.3.RELEASE
->4.3.17.RELEASE
GitHub Vulnerability Alerts
CVE-2018-1257
Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack.
CVE-2018-1270
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack.
CVE-2018-1271
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.
CVE-2016-5007
Both Spring Security 3.2.x, 4.0.x, 4.1.0 and the Spring Framework 3.2.x, 4.0.x, 4.1.x, 4.2.x (as well as other unsupported versions) rely on URL pattern mappings for authorization and for mapping requests to controllers respectively. Differences in the strictness of the pattern matching mechanisms, for example with regards to space trimming in path segments, can lead Spring Security to not recognize certain paths as not protected that are in fact mapped to Spring MVC controllers that should be protected. The problem is compounded by the fact that the Spring Framework provides richer features with regards to pattern matching as well as by the fact that pattern matching in each Spring Security and the Spring Framework can easily be customized creating additional differences.
CVE-2018-1272
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.
CVE-2018-1275
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.
CVE-2014-3578
Directory traversal vulnerability in Pivotal Spring Framework 3.x before 3.2.9 and 4.0 before 4.0.5 allows remote attackers to read arbitrary files via a crafted URL.
CVE-2015-5211
Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response.
Release Notes
spring-projects/spring-framework (org.springframework:spring-core)
v4.3.17.RELEASE
: 4.3.17 ReleaseCompare Source
⭐ New Features
🪲 Bug Fixes
v4.3.16.RELEASE
: 4.3.16 ReleaseCompare Source
🪲 Bug Fixes
v4.3.15.RELEASE
: 4.3.15 ReleaseCompare Source
⭐ New Features
@DependsOn
throws a NoSuchBeanDefinitionException it should include the dependent bean for clarity [SPR-16628] #21169🪲 Bug Fixes
📔 Documentation
@Transactional
with AspectJ [SPR-16552] #21095@Scope
not inherited from base class [SPR-16602] #21143v4.3.14.RELEASE
: 4.3.14 ReleaseCompare Source
⭐ New Features
🪲 Bug Fixes
@Retryable
and@Scheduled
/@JmsListener
doesn't work [SPR-16196] #20744@JmsListener
concurrency property is ignored if DefaultJmsListenerContainerFactory#concurrency is set [SPR-16338] #20885📔 Documentation
v4.3.13.RELEASE
: 4.3.13 ReleaseCompare Source
⭐ New Features
@Order
[SPR-16090] #20639🪲 Bug Fixes
@ModelAttribute
binding defined globally for particular attribute rather than per method invocation [SPR-16083] #20632📔 Documentation
v4.3.12.RELEASE
: 4.3.12 ReleaseCompare Source
⭐ New Features
🪲 Bug Fixes
@RequestParam
argument is null in multipart/form-data POST [SPR-15918] #20472@RequestParam
[SPR-15919] #20473v4.3.11.RELEASE
: 4.3.11 ReleaseCompare Source
⭐ New Features
@Lazy
collection of optional elements should not crash when no candidates are found [SPR-15858] #20413🪲 Bug Fixes
@Lazy
validator [SPR-15807] #20362@Configuration
class [SPR-14603] #19172v4.3.10.RELEASE
: 4.3.10 ReleaseCompare Source
⭐ New Features
🪲 Bug Fixes
@EventListener
's 'condition' doesn't work as expected with proxied beans [SPR-15678] #20237v4.3.9.RELEASE
: 4.3.9 ReleaseCompare Source
⭐ New Features
@Autowired
(required=false) at parameter level, as an alternative to java.util.Optional [SPR-15268] #19833🪲 Bug Fixes
@Lazy
validator [SPR-15629] #20188@EnableAsync
's javadoc) [SPR-15566] #20125📔 Documentation
v4.3.8.RELEASE
: 4.3.8 ReleaseCompare Source
⭐ New Features
@Lookup
methods within@Configuration
classes [SPR-15316] #19879@ResponseStatus
annotation for each request [SPR-15227] #19792🪲 Bug Fixes
📔 Documentation
@ControllerAdvice
Javadoc to discuss ordering [SPR-15432] #19993v4.3.7.RELEASE
: 4.3.7 ReleaseCompare Source
⭐ New Features
🪲 Bug Fixes
@Configuration
processing fails to handle AbstractFactoryBean.getObject() calls [SPR-15275] #19840@RestController
@GetMapping
methods [SPR-15261] #19826@CacheResult
does not seamlessly call method (in contrast to@Cacheable
) [SPR-15188] #19754Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.