HTTP PATCH Resource Exposure in Spring Data REST by VMware
CVE-2022-31679

3.7LOW

Key Information:

Vendor
Vmware
Vendor
CVE Published:
21 September 2022

Summary

Certain versions of Spring Data REST from VMware are prone to a vulnerability that allows unauthorized access to hidden entity attributes. This arises when applications accept HTTP PATCH requests, permitting attackers who are familiar with the structured domain model to craft malicious requests. Such exploitation could lead to sensitive information disclosure, as attackers may manipulate requests to access and view data that should remain protected.

Affected Version(s)

Spring Data REST Spring Data REST Versions before 3.6.7 and 3.7.3

References

CVSS V3.1

Score:
3.7
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.