mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-19 17:30:12 +00:00
20 lines
1.6 KiB
Markdown
20 lines
1.6 KiB
Markdown
![]() |
### [CVE-2024-22234](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22234)
|
|||
|

|
|||
|

|
|||
|

|
|||
|
|
|||
|
### Description
|
|||
|
|
|||
|
In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method.Specifically, an application is vulnerable if: * The application uses AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly and a null authentication parameter is passed to it resulting in an erroneous true return value.An application is not vulnerable if any of the following is true: * The application does not use AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly. * The application does not pass null to AuthenticationTrustResolver.isFullyAuthenticated * The application only uses isFullyAuthenticated via Method Security https://docs.spring.io/spring-security/reference/servlet/authorization/method-security.html or HTTP Request Security https://docs.spring.io/spring-security/reference/servlet/authorization/authorize-http-requests.html
|
|||
|
|
|||
|
### POC
|
|||
|
|
|||
|
#### Reference
|
|||
|
No PoCs from references.
|
|||
|
|
|||
|
#### Github
|
|||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|||
|
- https://github.com/shellfeel/CVE-2024-22243-CVE-2024-22234
|
|||
|
- https://github.com/tanjiti/sec_profile
|
|||
|
|