CVE-2024-22234

Severity CVSS v4.0:
Pending analysis
Type:
CWE-284 Improper Access Control
Publication date:
20/02/2024
Last modified:
02/04/2025

Description

In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method.<br /> <br /> Specifically, an application is vulnerable if:<br /> <br /> * The application uses AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly and a null authentication parameter is passed to it resulting in an erroneous true return value.<br /> <br /> <br /> An application is not vulnerable if any of the following is true:<br /> <br /> * The application does not use AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly.<br /> * The application does not pass null to AuthenticationTrustResolver.isFullyAuthenticated<br /> * The application only uses isFullyAuthenticated via Method Security https://docs.spring.io/spring-security/reference/servlet/authorization/method-security.html  or HTTP Request Security https://docs.spring.io/spring-security/reference/servlet/authorization/authorize-http-requests.html

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* 6.1.0 (including) 6.1.7 (excluding)
cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* 6.2.0 (including) 6.2.2 (excluding)