Page 6 of 119 results (0.005 seconds)

CVSS: 5.5EPSS: 0%CPEs: 7EXPL: 0

04 Mar 2022 — In spring cloud gateway versions prior to 3.1.1+ , applications that are configured to enable HTTP2 and no key store or trusted certificates are set will be configured to use an insecure TrustManager. This makes the gateway able to connect to remote services with invalid or custom certificates. En spring cloud gateway versiones anteriores a 3.1.1+ , las aplicaciones que son configuradas para habilitar HTTP2 y no es establecido un almacén de claves o certificados confiables son configurados para usar un Trus... • https://tanzu.vmware.com/security/cve-2022-22946 • CWE-295: Improper Certificate Validation •

CVSS: 10.0EPSS: 94%CPEs: 16EXPL: 61

03 Mar 2022 — In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host. En spring cloud gateway versiones anteriores a 3.1.1+ y a 3.0.7+ , las aplicaciones son vulnerables a un ataque de inyección de código cuando el endpoint del Actuador de la Puerta de Enlace está habilit... • https://packetstorm.news/files/id/166219 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

07 Jan 2022 — In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Framework codebase. En Spring Framework versiones 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, y en las versiones anteriores no soportadas, es posible que un usuario proporcione una entrada maliciosa que cause ... • https://tanzu.vmware.com/security/cve-2021-22060 •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

30 Nov 2021 — In Spring AMQP versions 2.2.0 - 2.2.19 and 2.3.0 - 2.3.11, the Spring AMQP Message object, in its toString() method, will create a new String object from the message body, regardless of its size. This can cause an OOM Error with a large message En Spring AMQP versiones 2.2.0 - 2.2.19 y 2.3.0 - 2.3.11, el objeto Spring AMQP Message, en su método toString(), crea un nuevo objeto String a partir del cuerpo del mensaje, independientemente de su tamaño. Esto puede causar un error OOM con un mensaje grande • https://tanzu.vmware.com/security/cve-2021-22097 • CWE-502: Deserialization of Untrusted Data •

CVSS: 8.8EPSS: 87%CPEs: 1EXPL: 2

19 Nov 2021 — Applications using both `spring-cloud-netflix-hystrix-dashboard` and `spring-boot-starter-thymeleaf` expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at `/hystrix/monitor;[user-provided data]`, the path elements following `hystrix/monitor` are being evaluated as SpringEL expressions, which can lead to code execution. Las aplicaciones que usan tanto "spring-cloud-netflix-hystrix-dashboard" como "spring-boot-starter-thymeleaf" e... • https://github.com/Vulnmachines/CVE-2021-22053 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

08 Nov 2021 — Applications using Spring Cloud Gateway are vulnerable to specifically crafted requests that could make an extra request on downstream services. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.5+, 2.2.x users should upgrade to 2.2.10.RELEASE or newer. Las aplicaciones que usan Spring Cloud Gateway son vulnerables a unas peticiones específicamente diseñadas que podrían hacer una petición extra en los servicios posteriores. Los usuarios de las versiones afec... • https://tanzu.vmware.com/security/cve-2021-22051 • CWE-863: Incorrect Authorization •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

28 Oct 2021 — In Spring AMQP versions 2.2.0 - 2.2.18 and 2.3.0 - 2.3.10, the Spring AMQP Message object, in its toString() method, will deserialize a body for a message with content type application/x-java-serialized-object. It is possible to construct a malicious java.util.Dictionary object that can cause 100% CPU usage in the application if the toString() method is called. En Spring AMQP versiones 2.2.0 - 2.2.18 y 2.3.0 - 2.3.10, el objeto Spring AMQP Message, en su método toString(), deserializará un cuerpo para un me... • https://tanzu.vmware.com/security/cve-2021-22097 • CWE-502: Deserialization of Untrusted Data •

CVSS: 4.3EPSS: 0%CPEs: 11EXPL: 0

28 Oct 2021 — In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. En Spring Framework versiones 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, y en versiones anteriores no soportadas, es posible para un usuario proporcionar una entrada maliciosa para causar una inserción de entradas de registro adicionales Red Hat Decision Manager is an open source decision management platform that combines bus... • https://security.netapp.com/advisory/ntap-20211125-0005 • CWE-117: Improper Output Neutralization for Logs •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

28 Oct 2021 — In Spring Data REST versions 3.4.0 - 3.4.13, 3.5.0 - 3.5.5, and older unsupported versions, HTTP resources implemented by custom controllers using a configured base API path and a controller type-level request mapping are additionally exposed under URIs that can potentially be exposed for unauthorized access depending on the Spring Security configuration. En Spring Data REST versiones 3.4.0 - 3.4.13, 3.5.0 - 3.5.5, y versiones anteriores no soportadas, los recursos HTTP implementados por controladores perso... • https://tanzu.vmware.com/security/cve-2021-22047 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

28 Oct 2021 — In Spring Cloud OpenFeign 3.0.0 to 3.0.4, 2.2.0.RELEASE to 2.2.9.RELEASE, and older unsupported versions, applications using type-level `@RequestMapping`annotations over Feign client interfaces, can be involuntarily exposing endpoints corresponding to `@RequestMapping`-annotated interface methods. En Spring Cloud OpenFeign versiones 3.0.0 a 3.0.4, 2.2.0.RELEASE a 2.2.9.RELEASE, y versiones anteriores no soportadas, las aplicaciones que usan anotaciones de "@RequestMapping" a nivel de tipo sobre las interfac... • https://tanzu.vmware.com/security/cve-2021-22044 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-668: Exposure of Resource to Wrong Sphere •