Applications that allow HTTP PATCH access to resources exposed by Spring Data REST in versions 3.6.0 - 3.5.5, 3.7.0 - 3.7.2, and older unsupported versions, if an attacker knows about the structure of the underlying domain model, they can craft HTTP requests that expose hidden entity attributes.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6811 | Applications that allow HTTP PATCH access to resources exposed by Spring Data REST in versions 3.6.0 - 3.5.5, 3.7.0 - 3.7.2, and older unsupported versions, if an attacker knows about the structure of the underlying domain model, they can craft HTTP requests that expose hidden entity attributes. |
Github GHSA |
GHSA-fv7x-v67w-cvqv | Spring Data REST can expose hidden entity attributes |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://tanzu.vmware.com/security/cve-2022-31679 |
|
History
Thu, 22 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2025-05-22T18:32:45.324Z
Reserved: 2022-05-25T00:00:00.000Z
Link: CVE-2022-31679
Updated: 2024-08-03T07:26:00.992Z
Status : Modified
Published: 2022-09-21T18:15:10.093
Modified: 2025-05-22T19:15:31.407
Link: CVE-2022-31679
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA