Spring Security doesn't consider URL path parameters when processing security constraints, allowing bypass via special encodings
Reporter | Title | Published | Views | Family All 18 |
---|---|---|---|---|
![]() | CVE-2018-1199 | 16 Mar 201820:00 | – | cvelist |
![]() | CVE-2018-1199 | 5 Feb 201811:49 | – | redhatcve |
![]() | Security Constraint Bypass | 31 Jan 201803:11 | – | veracode |
![]() | Directory Traversal | 6 Apr 201801:47 | – | veracode |
![]() | CVE-2018-1199 | 16 Mar 201820:29 | – | osv |
![]() | Improper Input Validation in org.springframework.security:spring-security-core, org.springframework.security:spring-security-core , and org.springframework:spring-core | 17 Oct 201820:01 | – | osv |
![]() | CVE-2018-1199 | 16 Mar 201800:00 | – | ubuntucve |
![]() | Improper Input Validation in org.springframework.security:spring-security-core, org.springframework.security:spring-security-core , and org.springframework:spring-core | 17 Oct 201820:01 | – | github |
![]() | Security feature bypass | 16 Mar 201820:29 | – | prion |
![]() | CVE-2018-1199 | 16 Mar 201820:29 | – | cve |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo