Vulnerability Name:

CVE-2021-22119 (CCN-204656)

Assigned:2021-06-28
Published:2021-06-28
Updated:2022-07-25
Summary:Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-863
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2021-22119

Source: XF
Type: UNKNOWN
vmwaretanzu-cve202122119-dos(204656)

Source: MLIST
Type: Mailing List, Third Party Advisory
[nifi-issues] 20210726 [jira] [Created] (NIFI-8948) Upgrade Spring Framework to 5.3.9 and Spring Security to 5.5.1

Source: MLIST
Type: Mailing List, Third Party Advisory
[portals-pluto-dev] 20210714 [jira] [Updated] (PLUTO-786) Upgrade to version Spring Framework 5.3.7 and Spring Security 5.5.1 due to CVE-2021-22112 and CVE-2021-22119

Source: MLIST
Type: Mailing List, Third Party Advisory
[portals-pluto-dev] 20210714 [jira] [Closed] (PLUTO-786) Upgrade to version Spring Framework 5.3.7 and Spring Security 5.5.1 due to CVE-2021-22112 and CVE-2021-22119

Source: MLIST
Type: Mailing List, Third Party Advisory
[portals-pluto-dev] 20210714 [jira] [Reopened] (PLUTO-786) Upgrade to version Spring Framework 5.3.7 and Spring Security 5.5.1 due to CVE-2021-22112 and CVE-2021-22119

Source: MLIST
Type: Mailing List, Third Party Advisory
[portals-pluto-dev] 20210714 [jira] [Comment Edited] (PLUTO-786) Upgrade to version Spring Framework 5.3.7 and Spring Security 5.5.1 due to CVE-2021-22112 and CVE-2021-22119

Source: MLIST
Type: Mailing List, Patch, Third Party Advisory
[portals-pluto-scm] 20210714 [portals-pluto] branch master updated: PLUTO-786 Upgrade to version Spring Framework 5.3.7 and Spring Security 5.5.1 due to CVE-2021-22112 and CVE-2021-22119

Source: CCN
Type: VMware Tanzu Web site
CVE-2021-22119: Denial-of-Service (DoS) attack via initiation of Authorization Request in Spring Security OAuth 2.0 Client Web and WebFlux Application

Source: MISC
Type: Vendor Advisory
https://tanzu.vmware.com/security/cve-2021-22119

Source: CCN
Type: IBM Security Bulletin 6497499 (Data Risk Manager)
IBM Data Risk Manager is affected by multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 7007359 (Process Mining)
Vulnerability in Spring Security affects IBM Process Mining . CVE-2021-22119

Source: CCN
Type: Oracle CPUJan2022
Oracle Critical Patch Update Advisory - January 2022

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2022.html

Source: CCN
Type: Oracle CPUJul2022
Oracle Critical Patch Update Advisory - July 2022

Source: N/A
Type: UNKNOWN
N/A

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2021-22119

Vulnerable Configuration:Configuration 1:
  • cpe:/a:vmware:spring_security:*:*:*:*:*:*:*:* (Version >= 5.5.0 and < 5.5.1)
  • OR cpe:/a:vmware:spring_security:*:*:*:*:*:*:*:* (Version >= 5.4.0 and < 5.4.7)
  • OR cpe:/a:vmware:spring_security:*:*:*:*:*:*:*:* (Version >= 5.2.0 and < 5.2.11)
  • OR cpe:/a:vmware:spring_security:*:*:*:*:*:*:*:* (Version >= 5.3.0 and < 5.3.10)

  • Configuration 2:
  • cpe:/a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:ibm:data_risk_manager:2.0.6:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    vmware spring security *
    vmware spring security *
    vmware spring security *
    vmware spring security *
    oracle communications cloud native core policy 1.14.0
    ibm data risk manager 2.0.6