Vulnerability Details CVE-2024-22234
In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method.
Specifically, an application is vulnerable if:
* The application uses AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly and a null authentication parameter is passed to it resulting in an erroneous true return value.
An application is not vulnerable if any of the following is true:
* The application does not use AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly.
* The application does not pass null to AuthenticationTrustResolver.isFullyAuthenticated
* The application only uses isFullyAuthenticated via Method Security https://docs.spring.io/spring-security/reference/servlet/authorization/method-security.html or HTTP Request Security https://docs.spring.io/spring-security/reference/servlet/authorization/authorize-http-requests.html
Exploit prediction scoring system (EPSS) score
EPSS Score 0.012
EPSS Ranking 77.9%
CVSS Severity
CVSS v3 Score 7.4
Products affected by CVE-2024-22234
-
cpe:2.3:a:vmware:spring_security:6.1.0
-
cpe:2.3:a:vmware:spring_security:6.1.1
-
cpe:2.3:a:vmware:spring_security:6.1.2
-
cpe:2.3:a:vmware:spring_security:6.1.3
-
cpe:2.3:a:vmware:spring_security:6.1.4
-
cpe:2.3:a:vmware:spring_security:6.1.5
-
cpe:2.3:a:vmware:spring_security:6.1.6
-
cpe:2.3:a:vmware:spring_security:6.2.0
-
cpe:2.3:a:vmware:spring_security:6.2.1