First published: Mon Jun 28 2021(Updated: )
Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vmware Spring Security | >=5.2.0<5.2.11 | |
Vmware Spring Security | >=5.3.0<5.3.10 | |
Vmware Spring Security | >=5.4.0<5.4.7 | |
Vmware Spring Security | >=5.5.0<5.5.1 | |
Oracle Communications Cloud Native Core Policy | =1.14.0 | |
IBM DRM | <=2.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22119 is a vulnerability in Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10, and 5.2.x prior to 5.2.11 that allows for a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application.
CVE-2021-22119 is considered to be a high severity vulnerability with a severity value of 7.
Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10, and 5.2.x prior to 5.2.11 are affected by CVE-2021-22119.
To fix CVE-2021-22119, update your Spring Security version to 5.5.1, 5.4.7, 5.3.10, or 5.2.11 depending on the version you are currently using.
You can find more information about CVE-2021-22119 at the following references: [CVE-2021-22119](https://www.cve.org/CVERecord?id=CVE-2021-22119), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2021-22119), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1977064), [Red Hat Advisory](https://access.redhat.com/errata/RHSA-2022:5532).