CVE-2022-22970 (Medium) detected in spring-beans-4.3.5.RELEASE.jar, spring-core-4.3.5.RELEASE.jar #115
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2022-22970 - Medium Severity Vulnerability
Vulnerable Libraries - spring-beans-4.3.5.RELEASE.jar, spring-core-4.3.5.RELEASE.jar
spring-beans-4.3.5.RELEASE.jar
Spring Beans
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /ClamScanService/pom.xml
Path to vulnerable library: /root/.m2/repository/org/springframework/spring-beans/4.3.5.RELEASE/spring-beans-4.3.5.RELEASE.jar,/root/.gradle/caches/modules-2/files-2.1/org.springframework/spring-beans/4.3.5.RELEASE/e12bbc3277da28e2e2608a187f83091dc6c300bf/spring-beans-4.3.5.RELEASE.jar
Dependency Hierarchy:
spring-core-4.3.5.RELEASE.jar
Spring Core
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /ClamScanService/pom.xml
Path to vulnerable library: /root/.m2/repository/org/springframework/spring-core/4.3.5.RELEASE/spring-core-4.3.5.RELEASE.jar,/root/.gradle/caches/modules-2/files-2.1/org.springframework/spring-core/4.3.5.RELEASE/80299e3f80e8c6d5c076db2ba6adf44a4b52f578/spring-core-4.3.5.RELEASE.jar
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.
Publish Date: 2022-05-12
URL: CVE-2022-22970
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://tanzu.vmware.com/security/cve-2022-22970
Release Date: 2022-05-12
Fix Resolution (org.springframework:spring-beans): 5.2.22.RELEASE
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-thymeleaf): 2.4.0
Fix Resolution (org.springframework:spring-core): 5.2.22.RELEASE
Direct dependency fix Resolution (org.springframework.boot:spring-boot-configuration-processor): 1.4.4.RELEASE
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: