In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or modify files that have been uploaded to the WebFlux application, or overwrite arbitrary files with multipart request data.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Link | Tags |
---|---|
https://tanzu.vmware.com/security/cve-2021-22118 | third party advisory |
https://www.oracle.com//security-alerts/cpujul2021.html | third party advisory patch |
https://security.netapp.com/advisory/ntap-20210713-0005/ | third party advisory |
https://www.oracle.com/security-alerts/cpuoct2021.html | third party advisory patch |
https://www.oracle.com/security-alerts/cpujan2022.html | third party advisory patch |
https://www.oracle.com/security-alerts/cpuapr2022.html | third party advisory patch |
https://www.oracle.com/security-alerts/cpujul2022.html | third party advisory patch |