In spring security versions prior to 5.4.11+, 5.5.7+ , 5.6.4+ and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
2022-05-19T15:15:08.057
2024-11-21T06:47:43.837
Modified
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | vmware | spring_security | < 5.5.7 | Yes |
Application | vmware | spring_security | < 5.6.4 | Yes |
Application | oracle | financial_services_crime_and_compliance_management_studio | 8.0.8.2.0 | Yes |
Application | oracle | financial_services_crime_and_compliance_management_studio | 8.0.8.3.0 | Yes |
Application | netapp | active_iq_unified_manager | - | Yes |
Application | netapp | active_iq_unified_manager | - | Yes |
Application | netapp | active_iq_unified_manager | - | Yes |