Vulnerability Description
Using "**" as a pattern in Spring Security configuration for WebFlux creates a mismatch in pattern matching between Spring Security and Spring WebFlux, and the potential for a security bypass.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vmware | Spring Security | >= 5.6.0, < 5.6.12 |
Related Weaknesses (CWE)
References
- https://security.netapp.com/advisory/ntap-20230814-0008/
- https://spring.io/security/cve-2023-34034Vendor Advisory
- https://security.netapp.com/advisory/ntap-20230814-0008/
- https://spring.io/security/cve-2023-34034Vendor Advisory
FAQ
What is CVE-2023-34034?
CVE-2023-34034 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Using "**" as a pattern in Spring Security configuration for WebFlux creates a mismatch in pattern matching between Spring Security and Spring WebFlux, and the potential for a security bypass.
How severe is CVE-2023-34034?
CVE-2023-34034 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-34034?
Check the references section above for vendor advisories and patch information. Affected products include: Vmware Spring Security.