Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-34035", "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "state": "PUBLISHED", "assignerShortName": "vmware", "dateReserved": "2023-05-25T17:21:56.200Z", "datePublished": "2023-07-18T15:29:10.091Z", "dateUpdated": "2024-10-25T15:47:50.802Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Spring Security", "vendor": "n/a", "versions": [{"status": "affected", "version": "Spring Security 5.8.0 to 5.8.4, Spring Security 6.0.0 to 6.0.4, Spring Security 6.1.0 to 6.1.1"}]}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<span style=\"background-color: rgb(255, 255, 255);\">Spring Security versions </span><strong>5.8</strong><span style=\"background-color: rgb(255, 255, 255);\"> prior to </span><strong>5.8.5</strong><span style=\"background-color: rgb(255, 255, 255);\">, </span><strong>6.0</strong><span style=\"background-color: rgb(255, 255, 255);\"> prior to </span><strong>6.0.5,</strong><span style=\"background-color: rgb(255, 255, 255);\"> and </span><strong>6.1</strong><span style=\"background-color: rgb(255, 255, 255);\"> prior to </span><strong>6.1.2</strong><span style=\"background-color: rgb(255, 255, 255);\"> could be susceptible to authorization rule misconfiguration if the application uses </span><code>requestMatchers(String)</code><span style=\"background-color: rgb(255, 255, 255);\"> and multiple servlets, one of them being Spring MVC\u2019s DispatcherServlet. <span style=\"background-color: rgb(255, 255, 255);\">(</span><code>DispatcherServlet</code><span style=\"background-color: rgb(255, 255, 255);\"> is a Spring MVC component that maps HTTP endpoints to methods on </span><code>@Controller</code><span style=\"background-color: rgb(255, 255, 255);\">-annotated classes.)<br></span></span><br><p>Specifically, an application is vulnerable when all of the following are true:</p><ul><li>Spring MVC is on the classpath</li><li>Spring Security is securing more than one servlet in a single application (one of them being Spring MVC\u2019s <code>DispatcherServlet</code>)</li><li>The application uses <code>requestMatchers(String)</code> to refer to endpoints that are not Spring MVC endpoints</li></ul><p>An application is not vulnerable if any of the following is true:</p><ul><li>The application does not have Spring MVC on the classpath</li><li>The application secures no servlets other than Spring MVC\u2019s <code>DispatcherServlet</code></li><li>The application uses <code>requestMatchers(String)</code> only for Spring MVC endpoints</li></ul><br>"}], "value": "Spring Security versions 5.8\u00a0prior to 5.8.5, 6.0\u00a0prior to 6.0.5,\u00a0and 6.1\u00a0prior to 6.1.2\u00a0could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String)\u00a0and multiple servlets, one of them being Spring MVC\u2019s DispatcherServlet.\u00a0(DispatcherServlet\u00a0is a Spring MVC component that maps HTTP endpoints to methods on @Controller-annotated classes.)\n\nSpecifically, an application is vulnerable when all of the following are true:\n\n * Spring MVC is on the classpath\n * Spring Security is securing more than one servlet in a single application (one of them being Spring MVC\u2019s DispatcherServlet)\n * The application uses requestMatchers(String)\u00a0to refer to endpoints that are not Spring MVC endpoints\n\n\nAn application is not vulnerable if any of the following is true:\n\n * The application does not have Spring MVC on the classpath\n * The application secures no servlets other than Spring MVC\u2019s DispatcherServlet\n * The application uses requestMatchers(String)\u00a0only for Spring MVC endpoints\n\n\n\n"}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"description": "Authorization rule misconfiguration", "lang": "en"}]}], "providerMetadata": {"orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware", "dateUpdated": "2023-07-18T15:29:10.091Z"}, "references": [{"url": "https://spring.io/security/cve-2023-34035"}], "source": {"discovery": "UNKNOWN"}, "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T15:54:14.210Z"}, "title": "CVE Program Container", "references": [{"url": "https://spring.io/security/cve-2023-34035", "tags": ["x_transferred"]}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-10-25T15:47:27.642233Z", "id": "CVE-2023-34035", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-25T15:47:50.802Z"}}]}}