CVE-2022-22978 (High) detected in spring-security-web-5.6.3.jar - autoclosed
mend-for-github-com opened this issue · 1 comments
CVE-2022-22978 - High Severity Vulnerability
Vulnerable Library - spring-security-web-5.6.3.jar
Spring Security
Library home page: https://spring.io/projects/spring-security
Path to dependency file: /symphony-bdk-examples/bdk-app-spring-boot-example/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework.security/spring-security-web/5.6.3/67db612f39c74268561fab887e2385f2b6cf324/spring-security-web-5.6.3.jar
Dependency Hierarchy:
- spring-boot-starter-security-2.6.7.jar (Root Library)
- ❌ spring-security-web-5.6.3.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
In Spring Security versions 5.5.6 and 5.5.7 and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with .
in the regular expression are possibly vulnerable to an authorization bypass.
Publish Date: 2022-05-19
URL: CVE-2022-22978
CVSS 3 Score Details (8.2)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://tanzu.vmware.com/security/cve-2022-22978
Release Date: 2022-05-19
Fix Resolution: org.springframework.security:spring-security-web:5.5.7,5.6.4
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.