CVE-2021-22119 – org.springframework.security:spring-security-core
Package
Manager: maven
Name: org.springframework.security:spring-security-core
Vulnerable Version: >=5.5.0 <5.5.1 || >=5.4.0 <5.4.7 || >=5.3.0 <5.3.10 || >=5.2.0 <5.2.11
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.04895 pctl0.89177
Details
Resource Exhaustion in Spring Security Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions.
Metadata
Created: 2021-07-02T18:33:34Z
Modified: 2022-03-30T21:15:14Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/07/GHSA-w9jg-gvgr-354m/GHSA-w9jg-gvgr-354m.json
CWE IDs: ["CWE-400", "CWE-863"]
Alternative ID: GHSA-w9jg-gvgr-354m
Finding: F002
Auto approve: 1