{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-22257","assignerOrgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","state":"PUBLISHED","assignerShortName":"vmware","dateReserved":"2024-01-08T18:43:15.942Z","datePublished":"2024-03-18T14:18:52.986Z","dateUpdated":"2025-02-13T17:33:39.030Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Spring Security","vendor":"N/A","versions":[{"status":"affected","version":"6.2.0 to 6.2.2, 6.1.0 to 6.1.7, 6.0.0 to 6.0.9, 5.8.0 to 5.8.10, 5.7.0 to 5.7.11"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In Spring Security, versions 5.7.x prior to 5.7.12, 5.8.x prior to \n5.8.11, versions 6.0.x prior to 6.0.9, versions 6.1.x prior to 6.1.8, \nversions 6.2.x prior to 6.2.3, an application is possible vulnerable to \nbroken access control when it directly uses the <code>AuthenticatedVoter#vote</code> passing a <code>null</code> Authentication parameter."}],"value":"In Spring Security, versions 5.7.x prior to 5.7.12, 5.8.x prior to \n5.8.11, versions 6.0.x prior to 6.0.9, versions 6.1.x prior to 6.1.8, \nversions 6.2.x prior to 6.2.3, an application is possible vulnerable to \nbroken access control when it directly uses the AuthenticatedVoter#vote passing a null Authentication parameter."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"description":"Possible Broken Access Control in Spring Security With Direct Use of AuthenticatedVoter","lang":"en"}]}],"providerMetadata":{"orgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","shortName":"vmware","dateUpdated":"2024-04-19T07:05:54.309Z"},"references":[{"url":"https://spring.io/security/cve-2024-22257"},{"url":"https://security.netapp.com/advisory/ntap-20240419-0005/"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-862","lang":"en","description":"CWE-862 Missing Authorization"}]}],"affected":[{"vendor":"pivotal_software","product":"spring_security","cpes":["cpe:2.3:a:pivotal_software:spring_security:5.7.0:*:*:*:*:*:*:*","cpe:2.3:a:pivotal_software:spring_security:5.8.0:*:*:*:*:*:*:*","cpe:2.3:a:pivotal_software:spring_security:6.0.0:*:*:*:*:*:*:*","cpe:2.3:a:pivotal_software:spring_security:6.1.0:*:*:*:*:*:*:*","cpe:2.3:a:pivotal_software:spring_security:6.2.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"5.7.0","status":"affected","lessThanOrEqual":"5.7.11","versionType":"custom"},{"version":"5.8.0","status":"affected","lessThanOrEqual":"5.8.10","versionType":"custom"},{"version":"6.0.0","status":"affected","lessThanOrEqual":"6.0.9","versionType":"custom"},{"version":"6.1.0","status":"affected","lessThanOrEqual":"6.1.7","versionType":"custom"},{"version":"6.2.0","status":"affected","lessThanOrEqual":"6.2.2","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-12T15:22:14.458591Z","id":"CVE-2024-22257","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-12T15:32:11.373Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T22:43:34.618Z"},"title":"CVE Program Container","references":[{"url":"https://spring.io/security/cve-2024-22257","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20240419-0005/","tags":["x_transferred"]}]}]}}