First published: Mon Oct 31 2022(Updated: )
A flaw was found in the spring-security framework. Spring Security could allow a remote attacker to bypass security restrictions caused by an issue when using forward or include dispatcher types. By sending a specially-crafted request, an attacker can bypass authorization rules.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <0:2.387.1.1680701869-1.el8 | 0:2.387.1.1680701869-1.el8 |
redhat/spring security | <5.7.5 | 5.7.5 |
redhat/spring security | <5.6.9 | 5.6.9 |
Vmware Spring Security | >=5.6.0<5.6.9 | |
Vmware Spring Security | >=5.7.0<5.7.5 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31692 is a vulnerability found in the Spring Security framework that allows a remote attacker to bypass authorization rules.
CVE-2022-31692 has a severity rating of 9.8 (critical).
Spring Security versions 5.7 prior to 5.7.5 and 5.6 prior to 5.6.9 are affected by CVE-2022-31692.
CVE-2022-31692 can be exploited by leveraging forward or include dispatcher types to bypass authorization rules.
More information about CVE-2022-31692 can be found at the following references: - [CVE Website](https://www.cve.org/CVERecord?id=CVE-2022-31692) - [NVD](https://nvd.nist.gov/vuln/detail/CVE-2022-31692) - [Spring Security Advisory](https://spring.io/security/cve-2022-31692) - [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=2162206) - [Red Hat Advisory](https://access.redhat.com/errata/RHSA-2023:3954)