Vulnerability Description
<Issue Description> Spring Security OAuth versions 2.5.x prior to 2.5.2 and older unsupported versions are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session. This vulnerability exposes OAuth 2.0 Client applications only.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pivotal | Spring Security Oauth | >= 2.4.0, < 2.4.2 |
| Oracle | Communications Design Studio | 7.4.2 |
References
- https://tanzu.vmware.com/security/cve-2022-22969Vendor Advisory
- https://www.oracle.com/security-alerts/cpujul2022.htmlPatchThird Party Advisory
- https://tanzu.vmware.com/security/cve-2022-22969Vendor Advisory
- https://www.oracle.com/security-alerts/cpujul2022.htmlPatchThird Party Advisory
FAQ
What is CVE-2022-22969?
CVE-2022-22969 is a vulnerability with a CVSS score of 6.5 (MEDIUM). <Issue Description> Spring Security OAuth versions 2.5.x prior to 2.5.2 and older unsupported versions are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Reque...
How severe is CVE-2022-22969?
CVE-2022-22969 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-22969?
Check the references section above for vendor advisories and patch information. Affected products include: Pivotal Spring Security Oauth, Oracle Communications Design Studio.