René's URL Explorer Experiment


Title: spring-web-4.3.30.RELEASE.jar: 3 vulnerabilities (highest severity is: 9.3) [master] (reachable) · Issue #41 · amaybaum-dev/BenchmarkJava · GitHub

Open Graph Title: spring-web-4.3.30.RELEASE.jar: 3 vulnerabilities (highest severity is: 9.3) [master] (reachable) · Issue #41 · amaybaum-dev/BenchmarkJava

X Title: spring-web-4.3.30.RELEASE.jar: 3 vulnerabilities (highest severity is: 9.3) [master] (reachable) · Issue #41 · amaybaum-dev/BenchmarkJava

Description: 📂 Vulnerable Library - spring-web-4.3.30.RELEASE.jar Spring Web Library home page: https://projects.spring.io/spring-framework Path to dependency file: /pom.xml Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframe...

Open Graph Description: 📂 Vulnerable Library - spring-web-4.3.30.RELEASE.jar Spring Web Library home page: https://projects.spring.io/spring-framework Path to dependency file: /pom.xml Path to vulnerable library: /home/ws...

X Description: 📂 Vulnerable Library - spring-web-4.3.30.RELEASE.jar Spring Web Library home page: https://projects.spring.io/spring-framework Path to dependency file: /pom.xml Path to vulnerable library: /home/ws...

Opengraph URL: https://github.com/amaybaum-dev/BenchmarkJava/issues/41

X: @github

direct link

Domain: patch-diff.githubusercontent.com


Hey, it has json ld scripts:
{"@context":"https://schema.org","@type":"DiscussionForumPosting","headline":"spring-web-4.3.30.RELEASE.jar: 3 vulnerabilities (highest severity is: 9.3) [master] (reachable)","articleBody":"\u003cdetails\u003e\n  \u003csummary\u003e📂 Vulnerable Library - \u003cstrong\u003espring-web-4.3.30.RELEASE.jar\u003c/strong\u003e\u003c/summary\u003e\n\nSpring Web\n\n**Library home page:** [ https://projects.spring.io/spring-framework ](https://projects.spring.io/spring-framework)\n\n**Path to dependency file:** /pom.xml\n\n**Path to vulnerable library:** /home/wss-scanner/.m2/repository/org/springframework/spring-web/4.3.30.RELEASE/spring-web-4.3.30.RELEASE.jar\n\n\n\u003c/details\u003e\n\n\n# Findings\n| Finding | Severity | 🎯 CVSS | Exploit Maturity | EPSS | Library | Type | Fixed in | Remediation Available | **Reachability** |\n| ------------- | ------------- | ---- | --- | ----- | ----- | ----- | --- | --- | --- |\n| [ CVE-2016-1000027 ](https://www.mend.io/vulnerability-database/CVE-2016-1000027) | 🟣 Critical | 9.3 | Not Defined | 59.2% | spring-web-4.3.30.RELEASE.jar | Direct | org.springframework:spring-web:6.0.0 | ✅ |\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/viaRed.png' width=20 height=22\u003e Reachable |\n| [ CVE-2021-22096 ](https://www.mend.io/vulnerability-database/CVE-2021-22096) | 🟠 Medium | 5.3 | Not Defined | \u003c 1% | spring-web-4.3.30.RELEASE.jar | Direct | N/A | ❌ |\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/viaGreen.png' width=20 height=22\u003e Unreachable |\n| [ CVE-2024-38820 ](https://www.mend.io/vulnerability-database/CVE-2024-38820) | 🟡 Low | 2.3 | Not Defined | \u003c 1% | spring-web-4.3.30.RELEASE.jar | Direct | org.springframework:spring-context:6.1.14 | ✅ | |\n\n\n# Details\n\n\n\u003cdetails\u003e\n  \u003csummary\u003e\n 🟣CVE-2016-1000027\n  \u003c/summary\u003e\n\n### Vulnerable Library - **spring-web-4.3.30.RELEASE.jar**\n\nSpring Web\n\n**Library home page:** [ https://projects.spring.io/spring-framework ](https://projects.spring.io/spring-framework)\n\n**Path to dependency file:** /pom.xml\n\n**Path to vulnerable library:** /home/wss-scanner/.m2/repository/org/springframework/spring-web/4.3.30.RELEASE/spring-web-4.3.30.RELEASE.jar\n\n\n\n**Dependency Hierarchy:**\n\n\n- ❌  **spring-web-4.3.30.RELEASE.jar** (Vulnerable Library)\n\n\n\n\n***\n\n### Reachability Analysis\nThis vulnerability is potentially reachable:\n\n```\n- org.owasp.benchmark.helpers.DataBaseServer (Application)\n    - org.springframework.http.ResponseEntity (Extension)\n        - org.springframework.http.ResponseEntity$DefaultBuilder (Extension)\n            -\u003e ❌ org.springframework.http.MediaType (Vulnerable Component)\n```\n***\n\n### Vulnerability Details\n\nPivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data. After conducting further research, Mend has determined that all versions of spring-web up to version 6.0.0 are vulnerable to CVE-2016-1000027.\n\n**Publish Date:** Jan 02, 2020 12:00 AM\n\n**URL:** [ CVE-2016-1000027 ](https://www.mend.io/vulnerability-database/CVE-2016-1000027)\n\n**Threat Assessment**\n\nExploit Maturity:Not Defined\n\nEPSS:59.2%\n\n**Score:** 9.3\n\n\n***\n### Suggested Fix\n\n**Type:** Upgrade version\n\n**Origin:** https://github.com/advisories/GHSA-4wrc-f8pq-fpqp\n\n**Release Date:** Jan 02, 2020 12:00 AM\n\n**Fix Resolution :** org.springframework:spring-web:6.0.0\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n  \u003csummary\u003e\n 🟠CVE-2021-22096\n  \u003c/summary\u003e\n\n### Vulnerable Library - **spring-web-4.3.30.RELEASE.jar**\n\nSpring Web\n\n**Library home page:** [ https://projects.spring.io/spring-framework ](https://projects.spring.io/spring-framework)\n\n**Path to dependency file:** /pom.xml\n\n**Path to vulnerable library:** /home/wss-scanner/.m2/repository/org/springframework/spring-web/4.3.30.RELEASE/spring-web-4.3.30.RELEASE.jar\n\n\n\n**Dependency Hierarchy:**\n\n\n- ❌  **spring-web-4.3.30.RELEASE.jar** (Vulnerable Library)\n\n\n\n\n***\n\n### Reachability Analysis\nThe vulnerable code is unreachable\n***\n\n### Vulnerability Details\n\nIn Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.\n\n**Publish Date:** Oct 28, 2021 03:22 PM\n\n**URL:** [ CVE-2021-22096 ](https://www.mend.io/vulnerability-database/CVE-2021-22096)\n\n**Threat Assessment**\n\nExploit Maturity:Not Defined\n\nEPSS:\u003c 1%\n\n**Score:** 5.3\n\n\n***\n### Suggested Fix\n\n**Type:** Upgrade version\n\n**Origin:** \n\n**Release Date:** \n\n**Fix Resolution :** \n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n  \u003csummary\u003e\n 🟡CVE-2024-38820\n  \u003c/summary\u003e\n\n### Vulnerable Library - **spring-web-4.3.30.RELEASE.jar**\n\nSpring Web\n\n**Library home page:** [ https://projects.spring.io/spring-framework ](https://projects.spring.io/spring-framework)\n\n**Path to dependency file:** /pom.xml\n\n**Path to vulnerable library:** /home/wss-scanner/.m2/repository/org/springframework/spring-web/4.3.30.RELEASE/spring-web-4.3.30.RELEASE.jar\n\n\n\n**Dependency Hierarchy:**\n\n\n- ❌  **spring-web-4.3.30.RELEASE.jar** (Vulnerable Library)\n\n\n\n\n***\n\n### Vulnerability Details\n\nThe fix for CVE-2022-22968 made disallowedFields patterns in DataBinder case insensitive. However, String.toLowerCase() has some Locale dependent exceptions that could potentially result in fields not protected as expected.\n\n**Publish Date:** Oct 18, 2024 05:39 AM\n\n**URL:** [ CVE-2024-38820 ](https://www.mend.io/vulnerability-database/CVE-2024-38820)\n\n**Threat Assessment**\n\nExploit Maturity:Not Defined\n\nEPSS:\u003c 1%\n\n**Score:** 2.3\n\n\n***\n### Suggested Fix\n\n**Type:** Upgrade version\n\n**Origin:** https://github.com/advisories/GHSA-4gc7-5j7h-4qph\n\n**Release Date:** Oct 18, 2024 05:39 AM\n\n**Fix Resolution :** org.springframework:spring-context:6.1.14\n\n\n\u003c/details\u003e\n\n[comment]: \u003c\u003e (\u003cMEND_ISSUE_METADATA\u003e{\"identifier\":\"spring-web-4.3.30.RELEASE.jar\",\"repoName\":\"BenchmarkJava\",\"branchName\":\"master\",\"type\":\"SCA_DEP\"}\u003c/MEND_ISSUE_METADATA\u003e)","author":{"url":"https://github.com/mend-developer-platform-dev[bot]","@type":"Person","name":"mend-developer-platform-dev[bot]"},"datePublished":"2025-09-28T05:43:43.000Z","interactionStatistic":{"@type":"InteractionCounter","interactionType":"https://schema.org/CommentAction","userInteractionCount":0},"url":"https://github.com/41/BenchmarkJava/issues/41"}

route-pattern/_view_fragments/issues/show/:user_id/:repository/:id/issue_layout(.:format)
route-controllervoltron_issues_fragments
route-actionissue_layout
fetch-noncev2:0e7407fc-276c-4c8e-2ab5-3dac0108df70
current-catalog-service-hash81bb79d38c15960b92d99bca9288a9108c7a47b18f2423d0f6438c5b7bcd2114
request-id8FFA:2D8363:16C02DD:20624B9:697A4167
html-safe-nonceb2e0b47520dde7e07a596f54bb2137cff8a71c60c5dcab56b7b2dd00c935e02e
visitor-payloadeyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiI4RkZBOjJEODM2MzoxNkMwMkREOjIwNjI0Qjk6Njk3QTQxNjciLCJ2aXNpdG9yX2lkIjoiMTQwOTA0NzAwNjI4NTU0NTgzMSIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9
visitor-hmace92f7e1adcbbbb98b6eeb6da178d5b8a7edf45d654b21f1202505860eff982d2
hovercard-subject-tagissue:3461119561
github-keyboard-shortcutsrepository,issues,copilot
google-site-verificationApib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I
octolytics-urlhttps://collector.github.com/github/collect
analytics-location///voltron/issues_fragments/issue_layout
fb:app_id1401488693436528
apple-itunes-appapp-id=1477376905, app-argument=https://github.com/_view_fragments/issues/show/amaybaum-dev/BenchmarkJava/41/issue_layout
twitter:imagehttps://opengraph.githubassets.com/0d17ed691434f86c9c6327380b366bbe06b541af95cbf310250cda9ecb14938b/amaybaum-dev/BenchmarkJava/issues/41
twitter:cardsummary_large_image
og:imagehttps://opengraph.githubassets.com/0d17ed691434f86c9c6327380b366bbe06b541af95cbf310250cda9ecb14938b/amaybaum-dev/BenchmarkJava/issues/41
og:image:alt📂 Vulnerable Library - spring-web-4.3.30.RELEASE.jar Spring Web Library home page: https://projects.spring.io/spring-framework Path to dependency file: /pom.xml Path to vulnerable library: /home/ws...
og:image:width1200
og:image:height600
og:site_nameGitHub
og:typeobject
og:author:usernamemend-developer-platform-dev[bot]
hostnamegithub.com
expected-hostnamegithub.com
None4a0b4010ae0a1c23b415e9254044ae36042a44c358266cc9a18f32128faad1cf
turbo-cache-controlno-preview
go-importgithub.com/amaybaum-dev/BenchmarkJava git https://github.com/amaybaum-dev/BenchmarkJava.git
octolytics-dimension-user_id29013484
octolytics-dimension-user_loginamaybaum-dev
octolytics-dimension-repository_id619308890
octolytics-dimension-repository_nwoamaybaum-dev/BenchmarkJava
octolytics-dimension-repository_publictrue
octolytics-dimension-repository_is_forktrue
octolytics-dimension-repository_parent_id33565372
octolytics-dimension-repository_parent_nwoOWASP-Benchmark/BenchmarkJava
octolytics-dimension-repository_network_root_id33565372
octolytics-dimension-repository_network_root_nwoOWASP-Benchmark/BenchmarkJava
turbo-body-classeslogged-out env-production page-responsive
disable-turbofalse
browser-stats-urlhttps://api.github.com/_private/browser/stats
browser-errors-urlhttps://api.github.com/_private/browser/errors
release751738b6aa7c947aef1bb025fad420093c6e3c81
ui-targetfull
theme-color#1e2327
color-schemelight dark

Links:

Skip to contenthttps://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava/issues/41#start-of-content
https://patch-diff.githubusercontent.com/
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Famaybaum-dev%2FBenchmarkJava%2Fissues%2F41
GitHub CopilotWrite better code with AIhttps://github.com/features/copilot
GitHub SparkBuild and deploy intelligent appshttps://github.com/features/spark
GitHub ModelsManage and compare promptshttps://github.com/features/models
MCP RegistryNewIntegrate external toolshttps://github.com/mcp
ActionsAutomate any workflowhttps://github.com/features/actions
CodespacesInstant dev environmentshttps://github.com/features/codespaces
IssuesPlan and track workhttps://github.com/features/issues
Code ReviewManage code changeshttps://github.com/features/code-review
GitHub Advanced SecurityFind and fix vulnerabilitieshttps://github.com/security/advanced-security
Code securitySecure your code as you buildhttps://github.com/security/advanced-security/code-security
Secret protectionStop leaks before they starthttps://github.com/security/advanced-security/secret-protection
Why GitHubhttps://github.com/why-github
Documentationhttps://docs.github.com
Bloghttps://github.blog
Changeloghttps://github.blog/changelog
Marketplacehttps://github.com/marketplace
View all featureshttps://github.com/features
Enterpriseshttps://github.com/enterprise
Small and medium teamshttps://github.com/team
Startupshttps://github.com/enterprise/startups
Nonprofitshttps://github.com/solutions/industry/nonprofits
App Modernizationhttps://github.com/solutions/use-case/app-modernization
DevSecOpshttps://github.com/solutions/use-case/devsecops
DevOpshttps://github.com/solutions/use-case/devops
CI/CDhttps://github.com/solutions/use-case/ci-cd
View all use caseshttps://github.com/solutions/use-case
Healthcarehttps://github.com/solutions/industry/healthcare
Financial serviceshttps://github.com/solutions/industry/financial-services
Manufacturinghttps://github.com/solutions/industry/manufacturing
Governmenthttps://github.com/solutions/industry/government
View all industrieshttps://github.com/solutions/industry
View all solutionshttps://github.com/solutions
AIhttps://github.com/resources/articles?topic=ai
Software Developmenthttps://github.com/resources/articles?topic=software-development
DevOpshttps://github.com/resources/articles?topic=devops
Securityhttps://github.com/resources/articles?topic=security
View all topicshttps://github.com/resources/articles
Customer storieshttps://github.com/customer-stories
Events & webinarshttps://github.com/resources/events
Ebooks & reportshttps://github.com/resources/whitepapers
Business insightshttps://github.com/solutions/executive-insights
GitHub Skillshttps://skills.github.com
Documentationhttps://docs.github.com
Customer supporthttps://support.github.com
Community forumhttps://github.com/orgs/community/discussions
Trust centerhttps://github.com/trust-center
Partnershttps://github.com/partners
GitHub SponsorsFund open source developershttps://github.com/sponsors
Security Labhttps://securitylab.github.com
Maintainer Communityhttps://maintainers.github.com
Acceleratorhttps://github.com/accelerator
Archive Programhttps://archiveprogram.github.com
Topicshttps://github.com/topics
Trendinghttps://github.com/trending
Collectionshttps://github.com/collections
Enterprise platformAI-powered developer platformhttps://github.com/enterprise
GitHub Advanced SecurityEnterprise-grade security featureshttps://github.com/security/advanced-security
Copilot for BusinessEnterprise-grade AI featureshttps://github.com/features/copilot/copilot-business
Premium SupportEnterprise-grade 24/7 supporthttps://github.com/premium-support
Pricinghttps://github.com/pricing
Search syntax tipshttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
documentationhttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Famaybaum-dev%2FBenchmarkJava%2Fissues%2F41
Sign up https://patch-diff.githubusercontent.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E%2Fvoltron%2Fissues_fragments%2Fissue_layout&source=header-repo&source_repo=amaybaum-dev%2FBenchmarkJava
Reloadhttps://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava/issues/41
Reloadhttps://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava/issues/41
Reloadhttps://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava/issues/41
amaybaum-dev https://patch-diff.githubusercontent.com/amaybaum-dev
BenchmarkJavahttps://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava
OWASP-Benchmark/BenchmarkJavahttps://patch-diff.githubusercontent.com/OWASP-Benchmark/BenchmarkJava
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2Famaybaum-dev%2FBenchmarkJava
Fork 0 https://patch-diff.githubusercontent.com/login?return_to=%2Famaybaum-dev%2FBenchmarkJava
Star 0 https://patch-diff.githubusercontent.com/login?return_to=%2Famaybaum-dev%2FBenchmarkJava
Code https://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava
Issues 24 https://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava/issues
Pull requests 9 https://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava/pulls
Actions https://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava/actions
Projects 0 https://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava/projects
Security 0 https://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava/security
Insights https://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava/pulse
Code https://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava
Issues https://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava/issues
Pull requests https://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava/pulls
Actions https://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava/actions
Projects https://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava/projects
Security https://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava/security
Insights https://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava/pulse
New issuehttps://patch-diff.githubusercontent.com/login?return_to=https://github.com/amaybaum-dev/BenchmarkJava/issues/41
New issuehttps://patch-diff.githubusercontent.com/login?return_to=https://github.com/amaybaum-dev/BenchmarkJava/issues/41
spring-web-4.3.30.RELEASE.jar: 3 vulnerabilities (highest severity is: 9.3) [master] (reachable)https://patch-diff.githubusercontent.com/amaybaum-dev/BenchmarkJava/issues/41#top
https://github.com/apps/mend-developer-platform-dev
https://github.com/apps/mend-developer-platform-dev
mend-developer-platform-devhttps://github.com/apps/mend-developer-platform-dev
on Sep 28, 2025https://github.com/amaybaum-dev/BenchmarkJava/issues/41#issue-3461119561
https://projects.spring.io/spring-framework https://projects.spring.io/spring-framework
CVE-2016-1000027 https://www.mend.io/vulnerability-database/CVE-2016-1000027
https://camo.githubusercontent.com/275a4487400571fbc1241101dbe0e5e29fe288995ada2ab7d7f3ffa1f12e8367/68747470733a2f2f7768697465736f757263652d7265736f75726365732e7768697465736f75726365736f6674776172652e636f6d2f7669615265642e706e67
CVE-2021-22096 https://www.mend.io/vulnerability-database/CVE-2021-22096
https://camo.githubusercontent.com/0d8454821575ec09d0c178651af426207e03ce995984bd236a02b2fcb856002e/68747470733a2f2f7768697465736f757263652d7265736f75726365732e7768697465736f75726365736f6674776172652e636f6d2f766961477265656e2e706e67
CVE-2024-38820 https://www.mend.io/vulnerability-database/CVE-2024-38820
CVE-2016-1000027https://github.com/advisories/GHSA-4wrc-f8pq-fpqp
https://projects.spring.io/spring-framework https://projects.spring.io/spring-framework
CVE-2016-1000027https://github.com/advisories/GHSA-4wrc-f8pq-fpqp
CVE-2016-1000027 https://www.mend.io/vulnerability-database/CVE-2016-1000027
GHSA-4wrc-f8pq-fpqphttps://github.com/advisories/GHSA-4wrc-f8pq-fpqp
CVE-2021-22096https://github.com/advisories/GHSA-rfmp-97jj-h8m6
https://projects.spring.io/spring-framework https://projects.spring.io/spring-framework
CVE-2021-22096 https://www.mend.io/vulnerability-database/CVE-2021-22096
CVE-2024-38820https://github.com/advisories/GHSA-4gc7-5j7h-4qph
https://projects.spring.io/spring-framework https://projects.spring.io/spring-framework
CVE-2022-22968https://github.com/advisories/GHSA-g5mm-vmx4-3rg7
CVE-2024-38820 https://www.mend.io/vulnerability-database/CVE-2024-38820
GHSA-4gc7-5j7h-4qphhttps://github.com/advisories/GHSA-4gc7-5j7h-4qph
https://github.com
Termshttps://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacyhttps://docs.github.com/site-policy/privacy-policies/github-privacy-statement
Securityhttps://github.com/security
Statushttps://www.githubstatus.com/
Communityhttps://github.community/
Docshttps://docs.github.com/
Contacthttps://support.github.com?tags=dotcom-footer

Viewport: width=device-width


URLs of crawlers that visited me.