Lucene search

K
vulnrichmentVmwareVULNRICHMENT:CVE-2024-22234
HistoryFeb 20, 2024 - 7:02 a.m.

CVE-2024-22234 CVE-2024-22234: Broken Access Control in Spring Security With Direct Use of isFullyAuthenticated

2024-02-2007:02:50
vmware
github.com
5
cve-2024-22234
spring security
access control

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

6.7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method.

Specifically, an application is vulnerable if:

  • The application uses AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly and a null authentication parameter is passed to it resulting in an erroneous true return value.

An application is not vulnerable if any of the following is true:

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:vmware:spring_security:6.1.0:*:*:*:*:*:*:*"
    ],
    "vendor": "vmware",
    "product": "spring_security",
    "versions": [
      {
        "status": "affected",
        "version": "6.1.0",
        "lessThan": "6.1.7",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:a:vmware:spring_security:6.2.0:*:*:*:*:*:*:*"
    ],
    "vendor": "vmware",
    "product": "spring_security",
    "versions": [
      {
        "status": "affected",
        "version": "6.2.0",
        "lessThan": "6.2.2",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

6.7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total