First published: Mon Oct 31 2022(Updated: )
A flaw was found in the Spring Security framework. Spring Security could allow a remote attacker to gain elevated privileges on the system. By modifying a request initiated by the Client (via the browser) to the Authorization Server, an attacker can gain elevated privileges on the system.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <0:2.387.1.1680701869-1.el8 | 0:2.387.1.1680701869-1.el8 |
redhat/Spring Security | <5.7.5 | 5.7.5 |
redhat/Spring Security | <5.6.9 | 5.6.9 |
Vmware Spring Security | >=5.6.0<5.6.9 | |
Vmware Spring Security | >=5.7.0<5.7.5 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-31690 is a vulnerability in the Spring Security framework that allows for privilege escalation.
Versions 5.7 to 5.7.5 and 5.6 to 5.6.9 of Spring Security are affected by CVE-2022-31690.
A malicious user can modify a request initiated by the Client to the Authorization Server in certain conditions to exploit CVE-2022-31690.
CVE-2022-31690 has a severity rating of 8.1 (High).
To fix CVE-2022-31690, upgrade to Spring Security version 5.7.5 or 5.6.9 depending on the current version you are using.