Lucene search

K
githubGitHub Advisory DatabaseGHSA-3H6F-G5F3-GC4W
HistoryJul 19, 2023 - 3:30 p.m.

Access Control Bypass in Spring Security

2023-07-1915:30:26
CWE-284
GitHub Advisory Database
github.com
92
spring security
webflux
pattern matching
bypass

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

68.9%

Using “**” as a pattern in Spring Security configuration for WebFlux creates a mismatch in pattern matching between Spring Security and Spring WebFlux, and the potential for a security bypass.

Affected configurations

Vulners
Node
org.springframework.securityspring-security-configRange6.1.06.1.2
OR
org.springframework.securityspring-security-configRange6.0.06.0.5
OR
org.springframework.securityspring-security-configRange5.8.05.8.5
OR
org.springframework.securityspring-security-configRange5.7.05.7.10
OR
org.springframework.securityspring-security-configRange5.6.05.6.12
VendorProductVersionCPE
org.springframework.securityspring-security-config*cpe:2.3:a:org.springframework.security:spring-security-config:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

68.9%