HTTP PATCH Resource Exposure in Spring Data REST by VMware
CVE-2022-31679
3.7LOW
Summary
Certain versions of Spring Data REST from VMware are prone to a vulnerability that allows unauthorized access to hidden entity attributes. This arises when applications accept HTTP PATCH requests, permitting attackers who are familiar with the structured domain model to craft malicious requests. Such exploitation could lead to sensitive information disclosure, as attackers may manipulate requests to access and view data that should remain protected.
Affected Version(s)
Spring Data REST Spring Data REST Versions before 3.6.7 and 3.7.3
References
CVSS V3.1
Score:
3.7
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved