Lucene search

K
githubGitHub Advisory DatabaseGHSA-WVP2-9PPW-337J
HistoryJul 25, 2023 - 6:24 p.m.

Paths contain matrix variables bypass decorators

2023-07-2518:24:39
CWE-863
GitHub Advisory Database
github.com
8
spring
armeria
integration
decorators
matrix variables
bypass

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

24.3%

Impact

Spring supports Matrix variables.
When Spring integration is used, Armeria calls Spring controllers via TomcatService or JettyService with the path
that may contain matrix variables.
In this situation, the Armeria decorators might not invoked because of the matrix variables.
Let’s see the following example:

// Spring controller
@GetMapping("/important/resources")
public String important() {...}

// Armeria decorator
ServerBuilder sb = ...
sb.decoratorUnder("/important/", authService);

If an attacker sends a request with /important;a=b/resources, the request would bypass the authrorizer

Patches

Workarounds

Users can add decorators using regex. e.g. "regex:^/important.*"

Affected configurations

Vulners
Node
com.linecorp.armeria\Matcharmeria
CPENameOperatorVersion
com.linecorp.armeria:armeriale1.24.2

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

24.3%

Related for GHSA-WVP2-9PPW-337J