Impact
Spring Security’s SubjectX500PrincipalExtractor does not handle certain malformed X.509 certificate CN values correctly, causing the wrong value to be interpreted as the authenticated username. A crafted certificate can therefore allow an attacker to impersonate another user for whom a valid certificate is not required.
Affected Systems
Spring Security from version 7.0.0 through 7.0.4.
Risk and Exploitability
The vulnerability has a CVSS score of 6.8, and an EPSS score of < 1%, indicating a very low probability of exploitation, and it is not listed in the CISA KEV catalog. Exploitation requires an application that accepts X.509 client certificates; the attacker would need to supply a specially crafted certificate, and if successful the victim’s session would be bound to the forged identity, granting access to resources normally denied.
OpenCVE Enrichment
Github GHSA