Description
Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1497 | Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions. |
Github GHSA |
GHSA-w9jg-gvgr-354m | Resource Exhaustion in Spring Security |
References
History
No history.
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2024-08-03T18:30:23.943Z
Reserved: 2021-01-04T00:00:00.000Z
Link: CVE-2021-22119
No data.
Status : Modified
Published: 2021-06-29T17:15:08.143
Modified: 2024-11-21T05:49:32.760
Link: CVE-2021-22119
OpenCVE Enrichment
No data.
EUVD
Github GHSA