Authorization Rule Misconfiguration in Spring Security by Pivotal Software
CVE-2023-34035

7.3HIGH

Key Information:

Vendor
Vmware
Vendor
CVE Published:
18 July 2023

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

Spring Security versions prior to 5.8.5, 6.0.5, and 6.1.2 contain a vulnerability that may allow for authorization rule misconfigurations. This primarily affects applications that utilize requestMatchers(String) with multiple servlets, including Spring MVC's DispatcherServlet. The application is at risk if it includes Spring MVC on the classpath and secures multiple servlets but does not restrict request matchers to only Spring MVC endpoints. Conversely, applications free of Spring MVC, or that secure only the DispatcherServlet with proper request matchers, are not affected.

Affected Version(s)

Spring Security Spring Security 5.8.0 to 5.8.4, Spring Security 6.0.0 to 6.0.4, Spring Security 6.1.0 to 6.1.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.