First published: Tue May 17 2022(Updated: )
A flaw was found in Spring Framework. The encoder does not perform any salt rounds when using the BCrypt class with the maximum work factor (31) due to an integer overflow error.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <0:2.401.1.1686831596-3.el8 | 0:2.401.1.1686831596-3.el8 |
redhat/spring-security | <5.5.7 | 5.5.7 |
redhat/spring-security | <5.6.4 | 5.6.4 |
redhat/spring-security | <5.7.0 | 5.7.0 |
Vmware Spring Security | <5.5.7 | |
Vmware Spring Security | >=5.6.0<5.6.4 | |
Oracle Financial Services Crime And Compliance Management Studio | =8.0.8.2.0 | |
Oracle Financial Services Crime And Compliance Management Studio | =8.0.8.3.0 | |
Netapp Active Iq Unified Manager Linux | ||
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows | ||
maven/org.springframework.security:spring-security-core | >=5.2.0.RELEASE<5.5.7 | 5.5.7 |
maven/org.springframework.security:spring-security-core | >=5.6.0<5.6.4 | 5.6.4 |
Vmware Spring Security | >=5.2.1<5.5.7 | |
Vmware Spring Security | =5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22976 is a vulnerability found in Spring Framework that allows an attacker to bypass salt rounds during encoding.
Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions are affected.
CVE-2022-22976 has a severity rating of 5.3, which is considered medium.
The official references for CVE-2022-22976 are: https://tanzu.vmware.com/security/cve-2022-22976, https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2087921, and https://access.redhat.com/errata/RHSA-2022:5532.
To fix CVE-2022-22976, upgrade to Spring Security versions 5.5.7, 5.6.4, or 5.7.0 which contain the necessary patches.