First published: Fri Jan 07 2022(Updated: )
In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to <a href="https://access.redhat.com/security/cve/CVE-2021-22096">CVE-2021-22096</a> that protects against additional types of input and in more places of the Spring Framework codebase. <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22060">https://nvd.nist.gov/vuln/detail/CVE-2021-22060</a> <a href="https://tanzu.vmware.com/security/cve-2021-22060">https://tanzu.vmware.com/security/cve-2021-22060</a>
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Spring Framework | >=5.2.0<=5.2.18 | |
Spring Framework | >=5.3.0<=5.3.13 | |
Oracle Communications Cloud Native Core Console | =1.9.0 | |
Oracle Communications Cloud Native Core Service Communication Proxy | =1.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22060 is a vulnerability in the Spring Framework that allows a user to provide malicious input to cause the insertion of additional log entries.
Versions 5.3.0 - 5.3.13 and 5.2.0 - 5.2.18 of the Spring Framework, as well as older unsupported versions, are affected by CVE-2021-22060.
CVE-2021-22060 has a severity value of 4.3, which is considered medium.
To protect against CVE-2021-22060, it is recommended to upgrade to a fixed version of Spring Framework.
You can find more information about CVE-2021-22060 on the CVE (https://www.cve.org/CVERecord?id=CVE-2021-22060) and NVD (https://nvd.nist.gov/vuln/detail/CVE-2021-22060) websites.