Lucene search

K
redhatcveRedhat.comRH:CVE-2023-34034
HistoryOct 02, 2023 - 7:55 p.m.

CVE-2023-34034

2023-10-0219:55:08
redhat.com
access.redhat.com
39
spring security
webflux
pattern matching
bypass
security settings
information disclosure
unauthorized access
denial of service

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.2

Confidence

High

EPSS

0.003

Percentile

68.9%

A flaw was found in Spring Security’s WebFlux framework pattern matching, where it does not properly evaluate certain patterns. A server using path-based pattern matching in WebFlux could allow an attacker to bypass security settings for some request paths, potentially leading to information disclosure, access of functionality outside the user’s permissions, or denial of service.

Mitigation

Users of path-based URL determination should ensure that all their patterns have a slash prepended.
example:
pathMatchers("home/") // vulnerable
pathMatchers("/home/
") // not vulnerable

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.2

Confidence

High

EPSS

0.003

Percentile

68.9%