CVE Vulnerabilities

CVE-2022-31692

Published: Oct 31, 2022 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.4 IMPORTANT
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Ubuntu
MEDIUM

Spring Security, versions 5.7 prior to 5.7.5 and 5.6 prior to 5.6.9 could be susceptible to authorization rules bypass via forward or include dispatcher types. Specifically, an application is vulnerable when all of the following are true: The application expects that Spring Security applies security to forward and include dispatcher types. The application uses the AuthorizationFilter either manually or via the authorizeHttpRequests() method. The application configures the FilterChainProxy to apply to forward and/or include requests (e.g. spring.security.filter.dispatcher-types = request, error, async, forward, include). The application may forward or include the request to a higher privilege-secured endpoint.The application configures Spring Security to apply to every dispatcher type via authorizeHttpRequests().shouldFilterAllDispatcherTypes(true)

Affected Software

Name Vendor Start Version End Version
Spring_security Vmware 5.6.0 (including) 5.6.9 (excluding)
Spring_security Vmware 5.7.0 (including) 5.7.5 (excluding)
Libspring-java Ubuntu bionic *
Libspring-java Ubuntu kinetic *
Libspring-java Ubuntu lunar *
Libspring-java Ubuntu mantic *
Libspring-java Ubuntu trusty *
Libspring-java Ubuntu trusty/esm *
Libspring-java Ubuntu xenial *
Red Hat Fuse 7.12 RedHat spring-security *
Red Hat OpenShift Container Platform 4.10 RedHat jenkins-0:2.387.1.1680701869-1.el8 *

References