Update dependency org.springframework.security:spring-security-core to v5 [SECURITY] #15
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
3.2.10.RELEASE
->5.7.12
GitHub Vulnerability Alerts
CVE-2016-5007
Both Spring Security 3.2.x, 4.0.x, 4.1.0 and the Spring Framework 3.2.x, 4.0.x, 4.1.x, 4.2.x (as well as other unsupported versions) rely on URL pattern mappings for authorization and for mapping requests to controllers respectively. Differences in the strictness of the pattern matching mechanisms, for example with regards to space trimming in path segments, can lead Spring Security to not recognize certain paths as not protected that are in fact mapped to Spring MVC controllers that should be protected. The problem is compounded by the fact that the Spring Framework provides richer features with regards to pattern matching as well as by the fact that pattern matching in each Spring Security and the Spring Framework can easily be customized creating additional differences.
CVE-2020-5408
Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack.
CVE-2019-11272
Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of ?null?.
CVE-2024-22257
In Spring Security, versions 5.7.x prior to 5.7.12, 5.8.x prior to 5.8.11, versions 6.0.x prior to 6.0.9, versions 6.1.x prior to 6.1.8, versions 6.2.x prior to 6.2.3, an application is possible vulnerable to broken access control when it directly uses the AuthenticatedVoter#vote passing a null Authentication parameter.
Specifically, an application is vulnerable if:
The application uses AuthenticatedVoter directly and a null authentication parameter is passed to it resulting in an erroneous true return value.
An application is not vulnerable if any of the following is true:
Note that AuthenticatedVoter is deprecated since 5.8, use implementations of AuthorizationManager as a replacement.
CVE-2022-22978
In Spring Security versions 5.5.6 and 5.5.7 and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with
.
in the regular expression are possibly vulnerable to an authorization bypass.Release Notes
spring-projects/spring-security (org.springframework.security:spring-security-core)
v5.7.12
Compare Source
🪲 Bug Fixes
null
Authentication #14715v5.7.11
Compare Source
⭐ New Features
v5.7.10
Compare Source
🪲 Bug Fixes
🔨 Dependency Upgrades
v5.7.9
Compare Source
⭐ New Features
🪲 Bug Fixes
🔨 Dependency Upgrades
❤️ Contributors
We'd like to thank all the contributors who worked on this release!
v5.7.8
Compare Source
⭐ New Features
🪲 Bug Fixes
🔨 Dependency Upgrades
❤️ Contributors
We'd like to thank all the contributors who worked on this release!
v5.7.7
Compare Source
⭐ New Features
🪲 Bug Fixes
DefaultSaml2AuthenticatedPrincipal
:LinkedMultiValueMap is not in the allowlist
#11785🔨 Dependency Upgrades
❤️ Contributors
We'd like to thank all the contributors who worked on this release!
v5.7.6
Compare Source
⭐ New Features
🪲 Bug Fixes
🔨 Dependency Upgrades
v5.7.5
Compare Source
🪲 Bug Fixes
v5.7.4
Compare Source
⭐ New Features
🪲 Bug Fixes
🔨 Dependency Upgrades
v5.7.3
Compare Source
⭐ New Features
🪲 Bug Fixes
🔨 Dependency Upgrades
v5.7.2
Compare Source
⭐ New Features
🪲 Bug Fixes
@Query
#11289🔨 Dependency Upgrades
❤️ Contributors
We'd like to thank all the contributors who worked on this release!
v5.7.1
Compare Source
🪲 Bug Fixes
v5.7.0
Compare Source
⭐ New Features
🪲 Bug Fixes
@EnableMethodSecurity
doesn't resolve annotations on interfaces through a Proxy #11177🔨 Dependency Upgrades
❤️ Contributors
We'd like to thank all the contributors who worked on this release!
v5.6.12
Compare Source
🪲 Bug Fixes
🔨 Dependency Upgrades
v5.6.11
Compare Source
⭐ New Features
🪲 Bug Fixes
🔨 Dependency Upgrades
v5.6.10
Compare Source
⭐ New Features
🪲 Bug Fixes
🔨 Dependency Upgrades
❤️ Contributors
We'd like to thank all the contributors who worked on this release!
v5.6.9
Compare Source
🪲 Bug Fixes
v5.6.8
Compare Source
⭐ New Features
🪲 Bug Fixes
🔨 Dependency Upgrades
❤️ Contributors
We'd like to thank all the contributors who worked on this release!
v5.6.7
Compare Source
⭐ New Features
🪲 Bug Fixes
🔨 Dependency Upgrades
v5.6.6
Compare Source
⭐ New Features
🪲 Bug Fixes
@Query
#11290🔨 Dependency Upgrades
v5.6.5
Compare Source
🪲 Bug Fixes
v5.6.4
Compare Source
⭐ New Features
🪲 Bug Fixes
🔨 Dependency Upgrades
v5.6.3
Compare Source
🪲 Bug Fixes
🔨 Dependency Upgrades
v5.6.2
Compare Source
⏪ Breaking Changes
⭐ New Features
AuthorizationManagerWebInvocationPrivilegeEvaluator
#10682🪲 Bug Fixes
SecurityFilterChain
s #10680🔨 Dependency Upgrades
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.