CVE编号
CVE-2021-22119利用情况
暂无补丁情况
N/A披露时间
2021-07-02漏洞描述
Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://lists.apache.org/thread.html/r08a449010786e0bcffa4b5781b04fcb55d6eafa... | |
https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e... | |
https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be58... | |
https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb38632... | |
https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b21019... | |
https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc8... | |
https://tanzu.vmware.com/security/cve-2021-22119 | |
https://www.oracle.com/security-alerts/cpujan2022.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | vmware | spring_security | * |
From (including) 5.2.0 |
Up to (excluding) 5.2.11 |
||||
运行在以下环境 | |||||||||
应用 | vmware | spring_security | * |
From (including) 5.3.0 |
Up to (excluding) 5.3.10 |
||||
运行在以下环境 | |||||||||
应用 | vmware | spring_security | * |
From (including) 5.4.0 |
Up to (excluding) 5.4.7 |
||||
运行在以下环境 | |||||||||
应用 | vmware | spring_security | * |
From (including) 5.5.0 |
Up to (excluding) 5.5.1 |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 无
- 完整性 无
还没有评论,来说两句吧...