cve/2024/CVE-2024-22257.md
2024-08-23 18:19:28 +00:00

20 lines
1.1 KiB
Markdown

### [CVE-2024-22257](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22257)
![](https://img.shields.io/static/v1?label=Product&message=Spring%20Security&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%206.2.0%20to%206.2.2%2C%206.1.0%20to%206.1.7%2C%206.0.0%20to%206.0.9%2C%205.8.0%20to%205.8.10%2C%205.7.0%20to%205.7.11%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Possible%20Broken%20Access%20Control%20in%20Spring%20Security%20With%20Direct%20Use%20of%20AuthenticatedVoter&color=brighgreen)
### Description
In Spring Security, versions 5.7.x prior to 5.7.12, 5.8.x prior to 5.8.11, versions 6.0.x prior to 6.0.9, versions 6.1.x prior to 6.1.8, versions 6.2.x prior to 6.2.3, an application is possible vulnerable to broken access control when it directly uses the AuthenticatedVoter#vote passing a null Authentication parameter.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/CllmsyK/YYBaby-Spring_Scan
- https://github.com/NaInSec/CVE-LIST
- https://github.com/fkie-cad/nvd-json-data-feeds