Title: spring-web-4.3.30.RELEASE.jar: 3 vulnerabilities (highest severity is: 9.3) [master] (reachable) · Issue #41 · amaybaum-dev/BenchmarkJava · GitHub
Open Graph Title: spring-web-4.3.30.RELEASE.jar: 3 vulnerabilities (highest severity is: 9.3) [master] (reachable) · Issue #41 · amaybaum-dev/BenchmarkJava
X Title: spring-web-4.3.30.RELEASE.jar: 3 vulnerabilities (highest severity is: 9.3) [master] (reachable) · Issue #41 · amaybaum-dev/BenchmarkJava
Description: 📂 Vulnerable Library - spring-web-4.3.30.RELEASE.jar Spring Web Library home page: https://projects.spring.io/spring-framework Path to dependency file: /pom.xml Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframe...
Open Graph Description: 📂 Vulnerable Library - spring-web-4.3.30.RELEASE.jar Spring Web Library home page: https://projects.spring.io/spring-framework Path to dependency file: /pom.xml Path to vulnerable library: /home/ws...
X Description: 📂 Vulnerable Library - spring-web-4.3.30.RELEASE.jar Spring Web Library home page: https://projects.spring.io/spring-framework Path to dependency file: /pom.xml Path to vulnerable library: /home/ws...
Opengraph URL: https://github.com/amaybaum-dev/BenchmarkJava/issues/41
X: @github
Domain: patch-diff.githubusercontent.com
{"@context":"https://schema.org","@type":"DiscussionForumPosting","headline":"spring-web-4.3.30.RELEASE.jar: 3 vulnerabilities (highest severity is: 9.3) [master] (reachable)","articleBody":"\u003cdetails\u003e\n \u003csummary\u003e📂 Vulnerable Library - \u003cstrong\u003espring-web-4.3.30.RELEASE.jar\u003c/strong\u003e\u003c/summary\u003e\n\nSpring Web\n\n**Library home page:** [ https://projects.spring.io/spring-framework ](https://projects.spring.io/spring-framework)\n\n**Path to dependency file:** /pom.xml\n\n**Path to vulnerable library:** /home/wss-scanner/.m2/repository/org/springframework/spring-web/4.3.30.RELEASE/spring-web-4.3.30.RELEASE.jar\n\n\n\u003c/details\u003e\n\n\n# Findings\n| Finding | Severity | 🎯 CVSS | Exploit Maturity | EPSS | Library | Type | Fixed in | Remediation Available | **Reachability** |\n| ------------- | ------------- | ---- | --- | ----- | ----- | ----- | --- | --- | --- |\n| [ CVE-2016-1000027 ](https://www.mend.io/vulnerability-database/CVE-2016-1000027) | 🟣 Critical | 9.3 | Not Defined | 59.2% | spring-web-4.3.30.RELEASE.jar | Direct | org.springframework:spring-web:6.0.0 | ✅ |\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/viaRed.png' width=20 height=22\u003e Reachable |\n| [ CVE-2021-22096 ](https://www.mend.io/vulnerability-database/CVE-2021-22096) | 🟠 Medium | 5.3 | Not Defined | \u003c 1% | spring-web-4.3.30.RELEASE.jar | Direct | N/A | ❌ |\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/viaGreen.png' width=20 height=22\u003e Unreachable |\n| [ CVE-2024-38820 ](https://www.mend.io/vulnerability-database/CVE-2024-38820) | 🟡 Low | 2.3 | Not Defined | \u003c 1% | spring-web-4.3.30.RELEASE.jar | Direct | org.springframework:spring-context:6.1.14 | ✅ | |\n\n\n# Details\n\n\n\u003cdetails\u003e\n \u003csummary\u003e\n 🟣CVE-2016-1000027\n \u003c/summary\u003e\n\n### Vulnerable Library - **spring-web-4.3.30.RELEASE.jar**\n\nSpring Web\n\n**Library home page:** [ https://projects.spring.io/spring-framework ](https://projects.spring.io/spring-framework)\n\n**Path to dependency file:** /pom.xml\n\n**Path to vulnerable library:** /home/wss-scanner/.m2/repository/org/springframework/spring-web/4.3.30.RELEASE/spring-web-4.3.30.RELEASE.jar\n\n\n\n**Dependency Hierarchy:**\n\n\n- ❌ **spring-web-4.3.30.RELEASE.jar** (Vulnerable Library)\n\n\n\n\n***\n\n### Reachability Analysis\nThis vulnerability is potentially reachable:\n\n```\n- org.owasp.benchmark.helpers.DataBaseServer (Application)\n - org.springframework.http.ResponseEntity (Extension)\n - org.springframework.http.ResponseEntity$DefaultBuilder (Extension)\n -\u003e ❌ org.springframework.http.MediaType (Vulnerable Component)\n```\n***\n\n### Vulnerability Details\n\nPivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data. After conducting further research, Mend has determined that all versions of spring-web up to version 6.0.0 are vulnerable to CVE-2016-1000027.\n\n**Publish Date:** Jan 02, 2020 12:00 AM\n\n**URL:** [ CVE-2016-1000027 ](https://www.mend.io/vulnerability-database/CVE-2016-1000027)\n\n**Threat Assessment**\n\nExploit Maturity:Not Defined\n\nEPSS:59.2%\n\n**Score:** 9.3\n\n\n***\n### Suggested Fix\n\n**Type:** Upgrade version\n\n**Origin:** https://github.com/advisories/GHSA-4wrc-f8pq-fpqp\n\n**Release Date:** Jan 02, 2020 12:00 AM\n\n**Fix Resolution :** org.springframework:spring-web:6.0.0\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n \u003csummary\u003e\n 🟠CVE-2021-22096\n \u003c/summary\u003e\n\n### Vulnerable Library - **spring-web-4.3.30.RELEASE.jar**\n\nSpring Web\n\n**Library home page:** [ https://projects.spring.io/spring-framework ](https://projects.spring.io/spring-framework)\n\n**Path to dependency file:** /pom.xml\n\n**Path to vulnerable library:** /home/wss-scanner/.m2/repository/org/springframework/spring-web/4.3.30.RELEASE/spring-web-4.3.30.RELEASE.jar\n\n\n\n**Dependency Hierarchy:**\n\n\n- ❌ **spring-web-4.3.30.RELEASE.jar** (Vulnerable Library)\n\n\n\n\n***\n\n### Reachability Analysis\nThe vulnerable code is unreachable\n***\n\n### Vulnerability Details\n\nIn Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.\n\n**Publish Date:** Oct 28, 2021 03:22 PM\n\n**URL:** [ CVE-2021-22096 ](https://www.mend.io/vulnerability-database/CVE-2021-22096)\n\n**Threat Assessment**\n\nExploit Maturity:Not Defined\n\nEPSS:\u003c 1%\n\n**Score:** 5.3\n\n\n***\n### Suggested Fix\n\n**Type:** Upgrade version\n\n**Origin:** \n\n**Release Date:** \n\n**Fix Resolution :** \n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n \u003csummary\u003e\n 🟡CVE-2024-38820\n \u003c/summary\u003e\n\n### Vulnerable Library - **spring-web-4.3.30.RELEASE.jar**\n\nSpring Web\n\n**Library home page:** [ https://projects.spring.io/spring-framework ](https://projects.spring.io/spring-framework)\n\n**Path to dependency file:** /pom.xml\n\n**Path to vulnerable library:** /home/wss-scanner/.m2/repository/org/springframework/spring-web/4.3.30.RELEASE/spring-web-4.3.30.RELEASE.jar\n\n\n\n**Dependency Hierarchy:**\n\n\n- ❌ **spring-web-4.3.30.RELEASE.jar** (Vulnerable Library)\n\n\n\n\n***\n\n### Vulnerability Details\n\nThe fix for CVE-2022-22968 made disallowedFields patterns in DataBinder case insensitive. However, String.toLowerCase() has some Locale dependent exceptions that could potentially result in fields not protected as expected.\n\n**Publish Date:** Oct 18, 2024 05:39 AM\n\n**URL:** [ CVE-2024-38820 ](https://www.mend.io/vulnerability-database/CVE-2024-38820)\n\n**Threat Assessment**\n\nExploit Maturity:Not Defined\n\nEPSS:\u003c 1%\n\n**Score:** 2.3\n\n\n***\n### Suggested Fix\n\n**Type:** Upgrade version\n\n**Origin:** https://github.com/advisories/GHSA-4gc7-5j7h-4qph\n\n**Release Date:** Oct 18, 2024 05:39 AM\n\n**Fix Resolution :** org.springframework:spring-context:6.1.14\n\n\n\u003c/details\u003e\n\n[comment]: \u003c\u003e (\u003cMEND_ISSUE_METADATA\u003e{\"identifier\":\"spring-web-4.3.30.RELEASE.jar\",\"repoName\":\"BenchmarkJava\",\"branchName\":\"master\",\"type\":\"SCA_DEP\"}\u003c/MEND_ISSUE_METADATA\u003e)","author":{"url":"https://github.com/mend-developer-platform-dev[bot]","@type":"Person","name":"mend-developer-platform-dev[bot]"},"datePublished":"2025-09-28T05:43:43.000Z","interactionStatistic":{"@type":"InteractionCounter","interactionType":"https://schema.org/CommentAction","userInteractionCount":0},"url":"https://github.com/41/BenchmarkJava/issues/41"}
| route-pattern | /_view_fragments/issues/show/:user_id/:repository/:id/issue_layout(.:format) |
| route-controller | voltron_issues_fragments |
| route-action | issue_layout |
| fetch-nonce | v2:0e7407fc-276c-4c8e-2ab5-3dac0108df70 |
| current-catalog-service-hash | 81bb79d38c15960b92d99bca9288a9108c7a47b18f2423d0f6438c5b7bcd2114 |
| request-id | 8FFA:2D8363:16C02DD:20624B9:697A4167 |
| html-safe-nonce | b2e0b47520dde7e07a596f54bb2137cff8a71c60c5dcab56b7b2dd00c935e02e |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiI4RkZBOjJEODM2MzoxNkMwMkREOjIwNjI0Qjk6Njk3QTQxNjciLCJ2aXNpdG9yX2lkIjoiMTQwOTA0NzAwNjI4NTU0NTgzMSIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9 |
| visitor-hmac | e92f7e1adcbbbb98b6eeb6da178d5b8a7edf45d654b21f1202505860eff982d2 |
| hovercard-subject-tag | issue:3461119561 |
| github-keyboard-shortcuts | repository,issues,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | / |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/_view_fragments/issues/show/amaybaum-dev/BenchmarkJava/41/issue_layout |
| twitter:image | https://opengraph.githubassets.com/0d17ed691434f86c9c6327380b366bbe06b541af95cbf310250cda9ecb14938b/amaybaum-dev/BenchmarkJava/issues/41 |
| twitter:card | summary_large_image |
| og:image | https://opengraph.githubassets.com/0d17ed691434f86c9c6327380b366bbe06b541af95cbf310250cda9ecb14938b/amaybaum-dev/BenchmarkJava/issues/41 |
| og:image:alt | 📂 Vulnerable Library - spring-web-4.3.30.RELEASE.jar Spring Web Library home page: https://projects.spring.io/spring-framework Path to dependency file: /pom.xml Path to vulnerable library: /home/ws... |
| og:image:width | 1200 |
| og:image:height | 600 |
| og:site_name | GitHub |
| og:type | object |
| og:author:username | mend-developer-platform-dev[bot] |
| hostname | github.com |
| expected-hostname | github.com |
| None | 4a0b4010ae0a1c23b415e9254044ae36042a44c358266cc9a18f32128faad1cf |
| turbo-cache-control | no-preview |
| go-import | github.com/amaybaum-dev/BenchmarkJava git https://github.com/amaybaum-dev/BenchmarkJava.git |
| octolytics-dimension-user_id | 29013484 |
| octolytics-dimension-user_login | amaybaum-dev |
| octolytics-dimension-repository_id | 619308890 |
| octolytics-dimension-repository_nwo | amaybaum-dev/BenchmarkJava |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | true |
| octolytics-dimension-repository_parent_id | 33565372 |
| octolytics-dimension-repository_parent_nwo | OWASP-Benchmark/BenchmarkJava |
| octolytics-dimension-repository_network_root_id | 33565372 |
| octolytics-dimension-repository_network_root_nwo | OWASP-Benchmark/BenchmarkJava |
| turbo-body-classes | logged-out env-production page-responsive |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | 751738b6aa7c947aef1bb025fad420093c6e3c81 |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
Links:
Viewport: width=device-width