
We found results for “”
CVE-2022-22978
Good to know:


Date: May 18, 2022
In spring security versions prior to 5.4.11+, 5.5.7+ , 5.6.4+ and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with "." in the regular expression are possibly vulnerable to an authorization bypass.
Language: Java
Severity Score
Related Resources (9)
Severity Score
Top Fix

Upgrade Version
Upgrade to version org.springframework.security:spring-security-web:5.6.4;org.springframework.security:spring-security-web:5.5.7;org.springframework.security:spring-security-web:5.4.11;org.springframework.security:spring-security-web:4.2.20-spring-security-4.2.21;org.springframework.security:spring-security-core:5.5.7;org.springframework.security:spring-security-core:5.6.4;org.springframework.security:spring-security-core:5.4.11
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | NONE |
Confidentiality (C): | PARTIAL |
Integrity (I): | PARTIAL |
Availability (A): | PARTIAL |
Additional information: |