Lucene search

K
githubGitHub Advisory DatabaseGHSA-7PHW-CXX7-Q9VQ
HistoryMar 28, 2023 - 12:34 a.m.

Spring Framework is vulnerable to security bypass via mvcRequestMatcher pattern mismatch

2023-03-2800:34:28
GitHub Advisory Database
github.com
155
spring framework
security bypass
mvcrequestmatcher
version 6.0.0 - 6.0.6
version 5.3.0 - 5.3.25
spring security configuration

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

36.7%

Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using “**” as a pattern in Spring Security configuration with the mvcRequestMatcher creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.

Affected configurations

Vulners
Node
org.springframework\Matchspring
OR
org.springframework\Matchspring

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

36.7%