First published: Wed Apr 13 2022(Updated: )
In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Spring Framework | <5.3.19 | 5.3.19 |
redhat/Spring Framework | <5.2.21 | 5.2.21 |
VMware Spring Framework | <5.2.0 | |
VMware Spring Framework | >=5.2.0<=5.2.20 | |
VMware Spring Framework | >=5.3.0<=5.3.18 | |
Netapp Active Iq Unified Manager Linux | ||
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows | ||
Netapp Cloud Secure Agent | ||
Netapp Metrocluster Tiebreaker Clustered Data Ontap | ||
NetApp Snap Creator Framework | ||
Netapp Snapmanager Oracle | ||
Netapp Snapmanager Sap | ||
Oracle Mysql Enterprise Monitor | <=8.0.29 | |
maven/org.springframework:spring-context | <5.2.21.RELEASE | 5.2.21.RELEASE |
maven/org.springframework:spring-context | >=5.3.0<5.3.19 | 5.3.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22968 is a vulnerability in the Spring Framework that allows insufficient protection of fields due to case sensitivity in data binding rules.
CVE-2022-22968 has a severity rating of medium.
Spring Framework versions 5.3.0 - 5.3.18 and 5.2.0 - 5.2.20, as well as older unsupported versions, are affected by CVE-2022-22968.
To fix CVE-2022-22968, update your Spring Framework to version 5.3.19 or 5.2.21, depending on the version you are using.
You can find more information about CVE-2022-22968 on the Red Hat website at the following links: [link1](https://access.redhat.com/errata/RHSA-2022:5101), [link2](https://access.redhat.com/security/cve/cve-2022-22968), [link3](https://access.redhat.com/errata/RHSA-2022:5532).