First published: Wed May 11 2022(Updated: )
A flaw was found in Spring Framework Applications. Applications that use STOMP over the WebSocket endpoint are vulnerable to a denial of service attack caused by an authenticated user.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/springframework | <5.3.20 | 5.3.20 |
redhat/springframework | <5.2.22 | 5.2.22 |
maven/org.springframework:spring-messaging | <=5.2.21.RELEASE | 5.2.22.RELEASE |
maven/org.springframework:spring-messaging | >=5.3.0<5.3.20 | 5.3.20 |
Spring Framework | >=5.2.0<=5.2.21 | |
Spring Framework | >=5.3.0<=5.3.19 | |
Oracle Financial Services Crime and Compliance Management Studio | =8.0.8.2.0 | |
Oracle Financial Services Crime and Compliance Management Studio | =8.0.8.3.0 | |
netapp cloud secure agent | ||
NetApp OnCommand Insight |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-22971 is a vulnerability in Spring Framework applications that allows an authenticated user to launch a denial of service (DoS) attack.
Versions of Spring Framework prior to 5.3.20+, 5.2.22+, and old unsupported versions are affected by CVE-2022-22971.
An authenticated user can exploit CVE-2022-22971 to launch a denial of service (DoS) attack on an application with a STOMP over WebSocket endpoint.
CVE-2022-22971 has a severity value of 6.5, which is considered medium.
Yes, the fix for CVE-2022-22971 is to upgrade to Spring Framework versions 5.3.20+ or 5.2.22+.