CVE-2024-22234
Severity CVSS v4.0:
Pending analysis
Type:
CWE-284
Improper Access Control
Publication date:
20/02/2024
Last modified:
02/04/2025
Description
In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method.<br />
<br />
Specifically, an application is vulnerable if:<br />
<br />
* The application uses AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly and a null authentication parameter is passed to it resulting in an erroneous true return value.<br />
<br />
<br />
An application is not vulnerable if any of the following is true:<br />
<br />
* The application does not use AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly.<br />
* The application does not pass null to AuthenticationTrustResolver.isFullyAuthenticated<br />
* The application only uses isFullyAuthenticated via Method Security https://docs.spring.io/spring-security/reference/servlet/authorization/method-security.html or HTTP Request Security https://docs.spring.io/spring-security/reference/servlet/authorization/authorize-http-requests.html
Impact
Base Score 3.x
7.40
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* | 6.1.0 (including) | 6.1.7 (excluding) |
| cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* | 6.2.0 (including) | 6.2.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



