Description
Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions.
Published: 2021-06-29
Score: 7.5 High
EPSS: 4.9% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-1497 Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions.
Github GHSA Github GHSA GHSA-w9jg-gvgr-354m Resource Exhaustion in Spring Security
History

No history.

Subscriptions

Oracle Communications Cloud Native Core Policy
Redhat Jboss Fuse
Vmware Spring Security
cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2024-08-03T18:30:23.943Z

Reserved: 2021-01-04T00:00:00.000Z

Link: CVE-2021-22119

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-29T17:15:08.143

Modified: 2024-11-21T05:49:32.760

Link: CVE-2021-22119

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-06-28T00:00:00Z

Links: CVE-2021-22119 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses