cve/2024/CVE-2024-22257.md

20 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-22257](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22257)
![](https://img.shields.io/static/v1?label=Product&message=Spring%20Security&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%206.2.0%20to%206.2.2%2C%206.1.0%20to%206.1.7%2C%206.0.0%20to%206.0.9%2C%205.8.0%20to%205.8.10%2C%205.7.0%20to%205.7.11%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Possible%20Broken%20Access%20Control%20in%20Spring%20Security%20With%20Direct%20Use%20of%20AuthenticatedVoter&color=brighgreen)
### Description
In Spring Security, versions 5.7.x prior to 5.7.12, 5.8.x prior to 5.8.11, versions 6.0.x prior to 6.0.9, versions 6.1.x prior to 6.1.8, versions 6.2.x prior to 6.2.3, an application is possible vulnerable to broken access control when it directly uses the AuthenticatedVoter#vote passing a null Authentication parameter.
### POC
#### Reference
No PoCs from references.
#### Github
2024-08-23 18:19:28 +00:00
- https://github.com/CllmsyK/YYBaby-Spring_Scan
2024-05-25 21:48:12 +02:00
- https://github.com/NaInSec/CVE-LIST
- https://github.com/fkie-cad/nvd-json-data-feeds