First published: Thu Oct 28 2021(Updated: )
In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ovirt-dependencies | <0:4.5.2-1.el8e | 0:4.5.2-1.el8e |
VMware Spring Framework | >=5.2.0<=5.2.17 | |
VMware Spring Framework | >=5.3.0<=5.3.10 | |
Netapp Active Iq Unified Manager Linux | ||
Netapp Active Iq Unified Manager Vsphere | ||
Netapp Active Iq Unified Manager Windows | ||
Netapp Management Services For Element Software And Netapp Hci | ||
Netapp Metrocluster Tiebreaker Clustered Data Ontap | ||
NetApp Snap Creator Framework | ||
Netapp Snapcenter | ||
Oracle Communications Cloud Native Core Console | =1.9.0 | |
Oracle Communications Cloud Native Core Service Communication Proxy | =1.15.0 | |
maven/org.springframework:spring | >=5.3.0<=5.3.10 | 5.3.11 |
maven/org.springframework:spring | >=5.2.0<=5.2.17 | 5.2.18 |
maven/org.springframework:spring-core | >=5.2.0<=5.2.17 | 5.2.18 |
maven/org.springframework:spring-core | >=5.3.0<=5.3.10 | 5.3.11 |
IBM QRadar SIEM | <=7.5.0 GA | |
IBM QRadar SIEM | <=7.4.3 GA - 7.4.3 FP4 | |
IBM QRadar SIEM | <=7.3.3 GA - 7.3.3 FP10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-22096 is a vulnerability in the Spring Framework that allows a remote attacker to bypass security restrictions and insert additional log entries.
Versions 5.3.0 - 5.3.10 and 5.2.0 - 5.2.17 of the Spring Framework are affected.
An attacker can exploit CVE-2021-22096 by sending a specially-crafted input to bypass security restrictions and insert additional log entries.
CVE-2021-22096 has a severity rating of medium.
You can find more information about CVE-2021-22096 on the VMware Security Advisory, Red Hat Bugzilla, and Red Hat Errata websites.