CVE-2023-34034

Severity
9.8CRITICAL
EPSS
47.9%
top 2.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 19
Latest updateJul 15

Description

Using "**" as a pattern in Spring Security configuration for WebFlux creates a mismatch in pattern matching between Spring Security and Spring WebFlux, and the potential for a security bypass.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 3.9 | Impact: 5.2

Affected Packages3 packages

NVDvmware/spring_security5.6.05.6.12+4
CVEListV5spring_securitySpring Security 6.1.06.1.1+4

🔴Vulnerability Details

3
CVEList
CVE-2023-34034: Using "**" as a pattern in Spring Security configuration for WebFlux creates a mismatch in pattern matching between Spring Security and Spring WebFlux2023-07-19
GHSA
Access Control Bypass in Spring Security2023-07-19
OSV
Access Control Bypass in Spring Security2023-07-19

📋Vendor Advisories

4
Oracle
Oracle Oracle Fusion Middleware Risk Matrix: WebCenter Sites (Spring Security) — CVE-2023-340342024-07-15
Oracle
Oracle Oracle Communications Applications Risk Matrix: PSR Designer (Spring Security) — CVE-2023-340342024-01-15
Oracle
Oracle Oracle Communications Risk Matrix: Install/Upgrade (Spring Security) — CVE-2023-340342023-10-15
Red Hat
spring-security-webflux: path wildcard leads to security bypass2023-07-19
CVE-2023-34034 (CRITICAL CVSS 9.8) | Using "**" as a pattern in Spring S | cvebase.io