logo

CVE-2023-34042 org.springframework.security:spring-security-config

Package

Manager: maven
Name: org.springframework.security:spring-security-config
Vulnerable Version: >=6.1.1 <6.1.4 || >=6.0.4 <6.0.7 || >=5.8.4 <5.8.7 || >=5.7.9 <5.7.11

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00043 pctl0.12284

Details

Spring Security's spring-security.xsd file is world writable The spring-security.xsd file inside the spring-security-config jar is world writable which means that if it were extracted it could be written by anyone with access to the file system. While there are no known exploits, this is an example of “CWE-732: Incorrect Permission Assignment for Critical Resource” and could result in an exploit. Users should update to the latest version of Spring Security to mitigate any future exploits found around this issue.

Metadata

Created: 2024-02-06T00:30:25Z
Modified: 2024-11-29T12:31:48Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-9gp8-6cg8-7h34/GHSA-9gp8-6cg8-7h34.json
CWE IDs: ["CWE-732"]
Alternative ID: GHSA-9gp8-6cg8-7h34
Finding: F039
Auto approve: 1