Data Binding Configuration Vulnerability in Spring Framework by VMware
CVE-2022-22968
Key Information:
- Vendor
- Vmware
- Status
- Vendor
- CVE Published:
- 14 April 2022
Badges
Summary
The Spring Framework exhibits a data binding configuration vulnerability where the 'disallowedFields' patterns are case-sensitive. This means that fields will only be effectively protected if they are explicitly listed with both upper and lower case for their initial characters. This extends to all nested fields within the property path, posing a potential security risk if developers are unaware of this requirement. Proper configuration is crucial to mitigate the risk of unauthorized data exposure.
Affected Version(s)
Spring Framework Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved