Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.springframework.security/spring-security-core
  4. ›
  5. CVE-2024-22234

CVE-2024-22234: Broken Access Control in Spring Security With Direct Use of isFullyAuthenticated

February 20, 2024 (updated February 13, 2025)

In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method.

Specifically, an application is vulnerable if:

  • The application uses AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly and a null authentication parameter is passed to it resulting in an erroneous true return value.

An application is not vulnerable if any of the following is true:

  • The application does not use AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly.
  • The application does not pass null to AuthenticationTrustResolver.isFullyAuthenticated
  • The application only uses isFullyAuthenticated via Method Security https://docs.spring.io/spring-security/reference/servlet/authorization/method-security.html  or HTTP Request Security https://docs.spring.io/spring-security/reference/servlet/authorization/authorize-http-requests.html

References

  • github.com/advisories/GHSA-w3w6-26f2-p474
  • github.com/spring-projects/spring-security
  • github.com/spring-projects/spring-security/commit/750cb30ce44d279c2f54c845d375e6a58bded569
  • nvd.nist.gov/vuln/detail/CVE-2024-22234
  • security.netapp.com/advisory/ntap-20240315-0003
  • spring.io/security/cve-2024-22234

Code Behaviors & Features

Detect and mitigate CVE-2024-22234 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 6.1.0 before 6.1.7, all versions starting from 6.2.0 before 6.2.2

Fixed versions

  • 6.1.7
  • 6.2.2

Solution

Upgrade to versions 6.1.7, 6.2.2 or above.

Impact 7.4 HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-284: Improper Access Control

Source file

maven/org.springframework.security/spring-security-core/CVE-2024-22234.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:15 +0000.