mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
22 lines
1.7 KiB
Markdown
22 lines
1.7 KiB
Markdown
### [CVE-2024-22234](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22234)
|
||

|
||

|
||

|
||
|
||
### Description
|
||
|
||
In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method.Specifically, an application is vulnerable if: * The application uses AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly and a null authentication parameter is passed to it resulting in an erroneous true return value.An application is not vulnerable if any of the following is true: * The application does not use AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly. * The application does not pass null to AuthenticationTrustResolver.isFullyAuthenticated * The application only uses isFullyAuthenticated via Method Security https://docs.spring.io/spring-security/reference/servlet/authorization/method-security.html or HTTP Request Security https://docs.spring.io/spring-security/reference/servlet/authorization/authorize-http-requests.html
|
||
|
||
### POC
|
||
|
||
#### Reference
|
||
No PoCs from references.
|
||
|
||
#### Github
|
||
- https://github.com/IES-Rafael-Alberti/Proyecto1_CybersecurityConsulting
|
||
- https://github.com/SMCallan/SSDLC-Security-Throughout-Development
|
||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
- https://github.com/shellfeel/CVE-2024-22243-CVE-2024-22234
|
||
- https://github.com/tanjiti/sec_profile
|
||
|