Lucene search

K
nessusThis script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.SPRING_SECURITY_CVE-2022-22978.NASL
HistoryJan 26, 2023 - 12:00 a.m.

Spring Security < 5.5.7 / 5.6.x < 5.6.4 Authorization Bypass

2023-01-2600:00:00
This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
130
spring security
authorization bypass
vulnerability
regexrequestmatcher
servlet containers

0.009 Low

EPSS

Percentile

82.3%

The remote host contains a Spring Security version that is prior to 5.5.7 or 5.6.x prior to 5.6.4. It is, therefore, affected by an authorization bypass vulnerability.

  • In Spring Security versions 5.5.6 and 5.6.3 and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with . in the regular expression are possibly vulnerable to an authorization bypass. (CVE-2022-22978)

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(170668);
  script_version("1.2");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/09/06");

  script_cve_id("CVE-2022-22978");

  script_name(english:"Spring Security < 5.5.7 / 5.6.x < 5.6.4 Authorization Bypass");

  script_set_attribute(attribute:"synopsis", value:
"The remote host contains a web application framework that is affected by an authorization bypass vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote host contains a Spring Security version that is prior to 5.5.7 or 5.6.x prior to 5.6.4. It is, therefore, 
affected by an authorization bypass vulnerability.

  - In Spring Security versions 5.5.6 and 5.6.3 and older unsupported versions, RegexRequestMatcher can easily
  be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.`
  in the regular expression are possibly vulnerable to an authorization bypass. (CVE-2022-22978)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://tanzu.vmware.com/security/CVE-2022-22978");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Spring Security version 5.5.7, 5.6.4, 5.7 or later.");
  script_set_attribute(attribute:"agent", value:"all");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-22978");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2022/05/16");
  script_set_attribute(attribute:"patch_publication_date", value:"2022/05/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/01/26");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:pivotal_software:spring_security");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("pivotal_software_spring_security_installed.nbin");
  script_require_keys("installed_sw/Spring Security");

  exit(0);
}

include('vcf.inc');

var app_info =  vcf::get_app_info(app:'Spring Security');

var constraints = [
  { 'min_version':'0.0', 'fixed_version':'5.5.7' },
  { 'min_version':'5.6', 'fixed_version':'5.6.4' }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
VendorProductVersionCPE
pivotal_softwarespring_securitycpe:/a:pivotal_software:spring_security