Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w3w6-26f2-p474

Опубликовано: 20 фев. 2024
Источник: github
Github: Прошло ревью
CVSS3: 7.4

Описание

Broken Access Control in Spring Security With Direct Use of isFullyAuthenticated

In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method.

Specifically, an application is vulnerable if:

  • The application uses AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly and a null authentication parameter is passed to it resulting in an erroneous true return value.

An application is not vulnerable if any of the following is true:

Пакеты

Наименование

org.springframework.security:spring-security-core

maven
Затронутые версииВерсия исправления

>= 6.1.0, < 6.1.7

6.1.7

Наименование

org.springframework.security:spring-security-core

maven
Затронутые версииВерсия исправления

>= 6.2.0, < 6.2.2

6.2.2

EPSS

Процентиль: 79%
0.01227
Низкий

7.4 High

CVSS3

Дефекты

CWE-284

Связанные уязвимости

CVSS3: 7.4
redhat
почти 2 года назад

In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method. Specifically, an application is vulnerable if: * The application uses AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly and a null authentication parameter is passed to it resulting in an erroneous true return value. An application is not vulnerable if any of the following is true: * The application does not use AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly. * The application does not pass null to AuthenticationTrustResolver.isFullyAuthenticated * The application only uses isFullyAuthenticated via Method Security https://docs.spring.io/spring-security/reference/servlet/authorization/method-security.html  or HTTP Request Security https://docs.spring.io/spring-security/reference/servlet...

CVSS3: 7.4
nvd
почти 2 года назад

In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method. Specifically, an application is vulnerable if: * The application uses AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly and a null authentication parameter is passed to it resulting in an erroneous true return value. An application is not vulnerable if any of the following is true: * The application does not use AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly. * The application does not pass null to AuthenticationTrustResolver.isFullyAuthenticated * The application only uses isFullyAuthenticated via Method Security https://docs.spring.io/spring-security/reference/servlet/authorization/method-security.html  or HTTP Request Security https://docs.spring.io/spring-security/referen

CVSS3: 7.4
debian
почти 2 года назад

In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x p ...

CVSS3: 7.4
fstec
почти 2 года назад

Уязвимость метода AuthenticationTrustResolver.isFullyAuthenticated(Authentication) Java-фреймворка для обеспечения безопасности промышленных приложений Spring Security, позволяющая нарушителю оказать влияние на целостность и конфиденциальность защищаемой информации

EPSS

Процентиль: 79%
0.01227
Низкий

7.4 High

CVSS3

Дефекты

CWE-284