CVE-2022-31690

Severity
8.1HIGH
EPSS
0.4%
top 41.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 31
Latest updateNov 1

Description

Spring Security, versions 5.7 prior to 5.7.5, and 5.6 prior to 5.6.9, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can modify a request initiated by the Client (via the browser) to the Authorization Server which can lead to a privilege escalation on the subsequent approval. This scenario can happen if the Authorization Server responds with an OAuth2 Access Token Response containing an empty scope list (per RF

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages3 packages

NVDvmware/spring_security5.6.05.6.9+1
CVEListV5spring_securitySpring Security (5.7 to 5.7.4 and 5.6 to 5.6.8 as well as older, unsupported versions)

🔴Vulnerability Details

4
GHSA
spring-security-oauth2-client vulnerable to Privilege Escalation2022-11-01
OSV
spring-security-oauth2-client vulnerable to Privilege Escalation2022-11-01
OSV
CVE-2022-31690: Spring Security, versions 52022-10-31
CVEList
CVE-2022-31690: Spring Security, versions 52022-10-31

📋Vendor Advisories

1
Red Hat
spring-security-oauth2-client: Privilege Escalation in spring-security-oauth2-client2022-10-31
CVE-2022-31690 (HIGH CVSS 8.1) | Spring Security | cvebase.io