Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS0zaDZmLWc1ZjMtZ2M0d84AA0zc

Access Control Bypass in Spring Security

Using "**" as a pattern in Spring Security configuration for WebFlux creates a mismatch in pattern matching between Spring Security and Spring WebFlux, and the potential for a security bypass.

Permalink: https://github.com/advisories/GHSA-3h6f-g5f3-gc4w
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0zaDZmLWc1ZjMtZ2M0d84AA0zc
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: 10 months ago
Updated: 6 months ago


CVSS Score: 9.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Identifiers: GHSA-3h6f-g5f3-gc4w, CVE-2023-34034
References: Blast Radius: 43.8

Affected Packages

maven:org.springframework.security:spring-security-config
Dependent packages: 1,227
Dependent repositories: 65,079
Downloads:
Affected Version Ranges: >= 6.1.0, < 6.1.2, >= 6.0.0, < 6.0.5, >= 5.8.0, < 5.8.5, >= 5.7.0, < 5.7.10, >= 5.6.0, < 5.6.12
Fixed in: 6.1.2, 6.0.5, 5.8.5, 5.7.10, 5.6.12
All affected versions: 5.6.0, 5.6.1, 5.6.2, 5.6.3, 5.6.4, 5.6.5, 5.6.6, 5.6.7, 5.6.8, 5.6.9, 5.6.10, 5.6.11, 5.7.0, 5.7.1, 5.7.2, 5.7.3, 5.7.4, 5.7.5, 5.7.6, 5.7.7, 5.7.8, 5.7.9, 5.8.0, 5.8.1, 5.8.2, 5.8.3, 5.8.4, 6.0.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.1.0, 6.1.1
All unaffected versions: 5.4.0, 5.4.1, 5.4.2, 5.4.3, 5.4.4, 5.4.5, 5.4.6, 5.4.7, 5.4.8, 5.4.9, 5.4.10, 5.4.11, 5.5.0, 5.5.1, 5.5.2, 5.5.3, 5.5.4, 5.5.5, 5.5.6, 5.5.7, 5.5.8, 5.6.12, 5.7.10, 5.7.11, 5.7.12, 5.8.5, 5.8.6, 5.8.7, 5.8.8, 5.8.9, 5.8.10, 5.8.11, 5.8.12, 6.0.5, 6.0.6, 6.0.7, 6.0.8, 6.1.2, 6.1.3, 6.1.4, 6.1.5, 6.1.6, 6.1.7, 6.1.8, 6.1.9, 6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.2.4