You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/security/spring-security-oauth2-client/6.2.4/spring-security-oauth2-client-6.2.4.jar
Vulnerabilities
CVE
Severity
CVSS
Dependency
Type
Fixed in (spring-boot-starter-oauth2-client version)
In Connect2id Nimbus JOSE+JWT before 9.37.2, an attacker can cause a denial of service (resource consumption) via a large JWE p2c header value (aka iteration count) for the PasswordBasedDecrypter (PBKDF2) component.
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/security/spring-security-oauth2-client/6.2.4/spring-security-oauth2-client-6.2.4.jar
The usage of String.toLowerCase() and String.toUpperCase() has some Locale dependent exceptions that could potentially result in authorization rules not working properly.
JSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for humans to read and write. It is easy for machines to parse and generate. It is based on a subset of the JavaScript Programming Language, Standard ECMA-262 3rd Edition - December 1999. JSON is a text format that is completely language independent but uses conventions that are familiar to programmers of the C-family of languages, including C, C++, C#, Java, JavaScript, Perl, Python, and many others. These properties make JSON an ideal data-interchange language.
A security issue was found in Netplex Json-smart 2.5.0 through 2.5.1. When loading a specially crafted JSON input, containing a large number of ’{’, a stack exhaustion can be trigger, which could allow an attacker to cause a Denial of Service (DoS). This issue exists because of an incomplete fix for CVE-2023-1370.
mend-for-jackfan.us.kgbot
changed the title
spring-boot-starter-oauth2-client-3.2.6.jar: 1 vulnerabilities (highest severity is: 7.5) reachable
spring-boot-starter-oauth2-client-3.2.6.jar: 2 vulnerabilities (highest severity is: 7.5) reachable
Nov 20, 2024
mend-for-jackfan.us.kgbot
changed the title
spring-boot-starter-oauth2-client-3.2.6.jar: 2 vulnerabilities (highest severity is: 7.5) reachable
spring-boot-starter-oauth2-client-3.2.6.jar: 3 vulnerabilities (highest severity is: 7.5) reachable
Feb 6, 2025
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/security/spring-security-oauth2-client/6.2.4/spring-security-oauth2-client-6.2.4.jar
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - nimbus-jose-jwt-9.24.4.jar
Java library for Javascript Object Signing and Encryption (JOSE) and JSON Web Tokens (JWT)
Library home page: https://connect2id.com
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/nimbusds/nimbus-jose-jwt/9.24.4/nimbus-jose-jwt-9.24.4.jar
Dependency Hierarchy:
Found in base branch: main
Reachability Analysis
This vulnerability is potentially reachable
Vulnerability Details
In Connect2id Nimbus JOSE+JWT before 9.37.2, an attacker can cause a denial of service (resource consumption) via a large JWE p2c header value (aka iteration count) for the PasswordBasedDecrypter (PBKDF2) component.
Publish Date: 2024-02-11
URL: CVE-2023-52428
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-52428
Release Date: 2024-02-11
Fix Resolution (com.nimbusds:nimbus-jose-jwt): 9.37.2
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-oauth2-client): 3.2.7
⛑️ Automatic Remediation will be attempted for this issue.
Vulnerable Library - spring-security-oauth2-client-6.2.4.jar
Spring Security
Library home page: https://spring.io
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/security/spring-security-oauth2-client/6.2.4/spring-security-oauth2-client-6.2.4.jar
Dependency Hierarchy:
Found in base branch: main
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
The usage of String.toLowerCase() and String.toUpperCase() has some Locale dependent exceptions that could potentially result in authorization rules not working properly.
Publish Date: 2024-12-02
URL: CVE-2024-38827
CVSS 3 Score Details (4.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2024-38827
Release Date: 2024-12-02
Fix Resolution (org.springframework.security:spring-security-oauth2-client): 6.2.8
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-oauth2-client): 3.2.12
⛑️ Automatic Remediation will be attempted for this issue.
Vulnerable Library - json-smart-2.5.1.jar
JSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for humans to read and write. It is easy for machines to parse and generate. It is based on a subset of the JavaScript Programming Language, Standard ECMA-262 3rd Edition - December 1999. JSON is a text format that is completely language independent but uses conventions that are familiar to programmers of the C-family of languages, including C, C++, C#, Java, JavaScript, Perl, Python, and many others. These properties make JSON an ideal data-interchange language.
Library home page: https://urielch.github.io/
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/net/minidev/json-smart/2.5.1/json-smart-2.5.1.jar
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
A security issue was found in Netplex Json-smart 2.5.0 through 2.5.1. When loading a specially crafted JSON input, containing a large number of ’{’, a stack exhaustion can be trigger, which could allow an attacker to cause a Denial of Service (DoS). This issue exists because of an incomplete fix for CVE-2023-1370.
Publish Date: 2025-02-05
URL: CVE-2024-57699
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-pq2g-wx69-c263
Release Date: 2025-02-05
Fix Resolution (net.minidev:json-smart): 2.5.2
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-oauth2-client): 3.2.7
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: