First published: Wed Jul 19 2023(Updated: )
Using "**" as a pattern in Spring Security configuration for WebFlux creates a mismatch in pattern matching between Spring Security and Spring WebFlux, and the potential for a security bypass.
Credit: security@vmware.com security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vmware Spring Security | >=5.6.0<5.6.12 | |
Vmware Spring Security | >=5.7.0<5.7.10 | |
Vmware Spring Security | >=5.8.0<5.8.5 | |
Vmware Spring Security | >=6.0.0<6.0.5 | |
Vmware Spring Security | >=6.1.0<6.1.2 | |
maven/org.springframework.security:spring-security-config | >=6.1.0<6.1.2 | 6.1.2 |
maven/org.springframework.security:spring-security-config | >=6.0.0<6.0.5 | 6.0.5 |
maven/org.springframework.security:spring-security-config | >=5.8.0<5.8.5 | 5.8.5 |
maven/org.springframework.security:spring-security-config | >=5.7.0<5.7.10 | 5.7.10 |
maven/org.springframework.security:spring-security-config | >=5.6.0<5.6.12 | 5.6.12 |
redhat/spring-security | <5.6.12 | 5.6.12 |
redhat/spring-security | <5.7.10 | 5.7.10 |
redhat/spring-security | <5.8.5 | 5.8.5 |
redhat/spring-security | <6.0.5 | 6.0.5 |
redhat/spring-security | <6.1.2 | 6.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is CVE-2023-34034.
The severity level of CVE-2023-34034 is critical with a score of 9.1.
The affected software for CVE-2023-34034 is org.springframework.security:spring-security-config versions between 5.6.0 and 6.1.2.
CVE-2023-34034 can create a mismatch in pattern matching between Spring Security and Spring WebFlux, leading to a security bypass.
To fix CVE-2023-34034, update your org.springframework.security:spring-security-config package to version 6.1.2.