mgh3326 / freelec-springboot2-webservice_practice

0 stars 0 forks source link

CVE-2022-31690 (High) detected in spring-security-oauth2-client-5.1.6.RELEASE.jar #115

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2022-31690 - High Severity Vulnerability

Vulnerable Library - spring-security-oauth2-client-5.1.6.RELEASE.jar

spring-security-oauth2-client

Library home page: https://spring.io/spring-security

Path to dependency file: /build.gradle

Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/org.springframework.security/spring-security-oauth2-client/5.1.6.RELEASE/8a77b659f7f6616ca5970796c04106595819f4eb/spring-security-oauth2-client-5.1.6.RELEASE.jar,/root/.gradle/caches/modules-2/files-2.1/org.springframework.security/spring-security-oauth2-client/5.1.6.RELEASE/8a77b659f7f6616ca5970796c04106595819f4eb/spring-security-oauth2-client-5.1.6.RELEASE.jar

Dependency Hierarchy: - spring-boot-starter-oauth2-client-2.1.9.RELEASE.jar (Root Library) - :x: **spring-security-oauth2-client-5.1.6.RELEASE.jar** (Vulnerable Library)

Found in HEAD commit: c8acb0f7c51f2947eb27c9dd900c7ed7e9e9994b

Found in base branch: master

Vulnerability Details

Spring Security, versions 5.7 prior to 5.7.5, and 5.6 prior to 5.6.9, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can modify a request initiated by the Client (via the browser) to the Authorization Server which can lead to a privilege escalation on the subsequent approval. This scenario can happen if the Authorization Server responds with an OAuth2 Access Token Response containing an empty scope list (per RFC 6749, Section 5.1) on the subsequent request to the token endpoint to obtain the access token.

Publish Date: 2022-10-31

URL: CVE-2022-31690

CVSS 3 Score Details (8.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://tanzu.vmware.com/security/cve-2022-31690

Release Date: 2022-10-31

Fix Resolution (org.springframework.security:spring-security-oauth2-client): 5.4.11

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-oauth2-client): 2.5.0


Step up your Open Source Security Game with Mend here