Closed mend-bolt-for-github[bot] closed 6 months ago
Thank you for opening an issue. If this issue is related to a bug, please follow the steps and provide the information outlined in the Troubleshooting Guide. Failure to follow these instructions may result in automatic closing of this issue.
Stale issue message
CVE-2024-22257 - High Severity Vulnerability
Vulnerable Library - spring-security-core-5.3.4.RELEASE.jar
spring-security-core
Library home page: https://spring.io/spring-security
Dependency Hierarchy: - spring-boot-starter-security-2.3.4.RELEASE.jar (Root Library) - spring-security-config-5.3.4.RELEASE.jar - :x: **spring-security-core-5.3.4.RELEASE.jar** (Vulnerable Library)
Found in HEAD commit: a2c4948f928bd87b03161413677b89bfd9370496
Found in base branch: master
Vulnerability Details
In Spring Security, versions 5.7.x prior to 5.7.12, 5.8.x prior to 5.8.11, versions 6.0.x prior to 6.0.9, versions 6.1.x prior to 6.1.8, versions 6.2.x prior to 6.2.3, an application is possible vulnerable to broken access control when it directly uses the AuthenticatedVoter#vote passing a null Authentication parameter.
Publish Date: 2024-03-18
URL: CVE-2024-22257
CVSS 3 Score Details (8.2)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2024-22257
Release Date: 2024-03-18
Fix Resolution (org.springframework.security:spring-security-core): 5.7.12
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-security): 3.0.0
Step up your Open Source Security Game with Mend here