First published: Mon Feb 05 2024(Updated: )
The spring-security.xsd file inside the spring-security-config jar is world writable which means that if it were extracted it could be written by anyone with access to the file system. While there are no known exploits, this is an example of “CWE-732: Incorrect Permission Assignment for Critical Resource” and could result in an exploit. Users should update to the latest version of Spring Security to mitigate any future exploits found around this issue.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.springframework.security:spring-security-config | >=5.7.9<=5.7.10 | 5.7.11 |
maven/org.springframework.security:spring-security-config | >=5.8.4<=5.8.6 | 5.8.7 |
maven/org.springframework.security:spring-security-config | >=6.0.4<=6.0.6 | 6.0.7 |
maven/org.springframework.security:spring-security-config | >=6.1.1<=6.1.3 | 6.1.4 |
Vmware Spring Security | >=5.8.4<5.8.7 | |
Vmware Spring Security | >=6.0.4<6.0.7 | |
Vmware Spring Security | >=6.1.1<6.1.4 | |
Vmware Spring Security | =5.7.9 | |
Vmware Spring Security | =5.7.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.