Path Parameter Bypass Vulnerability in Pivotal Spring Security
CVE-2016-9879
Key Information:
- Vendor
- Vmware
- Vendor
- CVE Published:
- 6 January 2017
Summary
A vulnerability exists in Pivotal Spring Security where URL path parameters are not considered when enforcing security constraints. This issue can lead to security bypasses when an attacker strategically includes an encoded '/' in the request. The problem is rooted in the inconsistencies in the handling of path parameters across different Servlet containers, particularly how they return values for getPathInfo(). Notably, users of Apache Tomcat are safeguarded since it adheres to established guidelines by stripping path parameters, whereas users of IBM WebSphere Application Server 8.5.x and other unverified containers may be at risk.
Affected Version(s)
Pivotal Spring Security before 3.2.10, 4.1.x before 4.1.4, and 4.2.x before 4.2.1 Pivotal Spring Security before 3.2.10, 4.1.x before 4.1.4, and 4.2.x before 4.2.1
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved