Access Control Bypass Affecting org.springframework.security:spring-security-config package, versions [5.6.0,5.6.12)[5.7.0,5.7.10)[5.8.0,5.8.5)[6.0.0,6.0.5)[6.1.0,6.1.2)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.25% (65th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Control Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5777893
  • published18 Jul 2023
  • disclosed18 Jul 2023
  • credittkswifty, Ha1c9on

Introduced: 18 Jul 2023

CVE-2023-34034  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade org.springframework.security:spring-security-config to version 5.6.12, 5.7.10, 5.8.5, 6.0.5, 6.1.2 or higher.

Overview

org.springframework.security:spring-security-config is a security configuration package for Spring Framework.

Affected versions of this package are vulnerable to Access Control Bypass. When using ** as a pattern in Spring Security configuration for WebFlux a mismatch in pattern matching is created between Spring Security and Spring WebFlux, resulting in a security bypass.

Note:

The fixed versions require Spring Framework versions:

  1. 6.0.11+

  2. 5.3.29+

  3. 5.2.25+

Note: The Spring security team have published information about an existing PoC, but have not shared the PoC itself publicly, therefore we don't currently have the ability to verify it.

CVSS Scores

version 3.1