Описание
Signature forgery in Spring Boot's Loader
Applications that use spring-boot-loader or spring-boot-loader-classic and contain custom code that performs signature verification of nested jar files may be vulnerable to signature forgery where content that appears to have been signed by one signer has, in fact, been signed by another.
Пакеты
org.springframework.boot:spring-boot-loader
>= 2.7.0, <= 2.7.21
2.7.22
org.springframework.boot:spring-boot-loader-classic
>= 2.7.0, <= 2.7.21
2.7.22
org.springframework.boot:spring-boot-loader
>= 3.0.0, <= 3.0.16
3.0.17
org.springframework.boot:spring-boot-loader-classic
>= 3.0.0, <= 3.0.16
3.0.17
org.springframework.boot:spring-boot-loader
>= 3.1.0, <= 3.1.12
3.1.13
org.springframework.boot:spring-boot-loader-classic
>= 3.1.0, <= 3.1.12
3.1.13
org.springframework.boot:spring-boot-loader
>= 3.2.0, <= 3.2.8
3.2.9
org.springframework.boot:spring-boot-loader-classic
>= 3.2.0, <= 3.2.8
3.2.9
org.springframework.boot:spring-boot-loader
>= 3.3.0, <= 3.3.2
3.3.3
org.springframework.boot:spring-boot-loader-classic
>= 3.3.0, <= 3.3.2
3.3.3
EPSS
7.2 High
CVSS4
6.3 Medium
CVSS3
CVE ID
Дефекты
Связанные уязвимости
Applications that use spring-boot-loader or spring-boot-loader-classic and contain custom code that performs signature verification of nested jar files may be vulnerable to signature forgery where content that appears to have been signed by one signer has, in fact, been signed by another.
Applications that use spring-boot-loader or spring-boot-loader-classic and contain custom code that performs signature verification of nested jar files may be vulnerable to signature forgery where content that appears to have been signed by one signer has, in fact, been signed by another.
Applications that use spring-boot-loaderor spring-boot-loader-classica ...
EPSS
7.2 High
CVSS4
6.3 Medium
CVSS3