VYPR
Critical severityNVD Advisory· Published May 19, 2022· Updated Aug 3, 2024

CVE-2022-22978

CVE-2022-22978

Description

In spring security versions prior to 5.4.11+, 5.5.7+ , 5.6.4+ and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with . in the regular expression are possibly vulnerable to an authorization bypass.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.springframework.security:spring-security-coreMaven
>= 5.5.0, < 5.5.75.5.7
org.springframework.security:spring-security-coreMaven
>= 5.6.0, < 5.6.45.6.4
org.springframework.security:spring-security-coreMaven
< 5.4.115.4.11
org.springframework.security:spring-security-webMaven
>= 5.5.0, < 5.5.75.5.7
org.springframework.security:spring-security-webMaven
>= 5.6.0, < 5.6.45.6.4
org.springframework.security:spring-security-webMaven
< 5.4.115.4.11

Affected products

1
  • Range: Spring security versions 5.4.x prior to 5.4.11+,5.5.x prior to 5.5.7+,5.6.x prior to 5.6.4+ and all earlier unsupported versions

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.