Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted.

Project Subscriptions

Vendors Products
Oncommand Insight Subscribe
Oncommand Unified Manager Subscribe
Oncommand Workflow Automation Subscribe
Snapcenter Subscribe
Storage Automation Store Subscribe
Agile Plm Subscribe
Application Testing Suite Subscribe
Big Data Discovery Subscribe
Communications Converged Application Server Subscribe
Communications Diameter Signaling Router Subscribe
Communications Network Integrity Subscribe
Communications Performance Intelligence Center Subscribe
Communications Services Gatekeeper Subscribe
Endeca Information Discovery Integrator Subscribe
Enterprise Manager For Mysql Database Subscribe
Enterprise Manager Ops Center Subscribe
Enterprise Repository Subscribe
Goldengate For Big Data Subscribe
Health Sciences Information Manager Subscribe
Healthcare Master Person Index Subscribe
Hospitality Guest Access Subscribe
Insurance Calculation Engine Subscribe
Insurance Policy Administration Subscribe
Insurance Rules Palette Subscribe
Micros Lucas Subscribe
Mysql Enterprise Monitor Subscribe
Peoplesoft Enterprise Fin Install Subscribe
Retail Assortment Planning Subscribe
Retail Back Office Subscribe
Retail Central Office Subscribe
Retail Customer Insights Subscribe
Retail Financial Integration Subscribe
Retail Integration Bus Subscribe
Retail Point-of-service Subscribe
Retail Returns Management Subscribe
Retail Xstore Point Of Service Subscribe
Service Architecture Leveraging Tuxedo Subscribe
Tape Library Acsls Subscribe
Weblogic Server Subscribe
Pivotal Software Subscribe
Spring Security Subscribe
Jboss Fuse Subscribe
Spring Framework Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2018-0586 Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted.
Github GHSA Github GHSA GHSA-cxrj-66c5-9fmh Spring Framework when used in combination with any versions of Spring Security contains an authorization bypass
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2024-09-17T02:56:37.459Z

Reserved: 2017-12-06T00:00:00

Link: CVE-2018-1258

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-05-11T20:29:00.260

Modified: 2024-11-21T03:59:28.953

Link: CVE-2018-1258

cve-icon Redhat

Severity : Moderate

Publid Date: 2018-05-09T00:00:00Z

Links: CVE-2018-1258 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses