Improper Authentication in Spring Security - CVE-2014-3527

 

Improper Authentication in Spring Security - CVE-2014-3527

Published: May 25, 2017 / Updated: August 8, 2020


Vulnerability identifier: #VU38944
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2014-3527
CWE-ID: CWE-287
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: VMware, Inc
Affected software:
Spring Security

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

When using the CAS Proxy ticket authentication from Spring Security 3.1 to 3.2.4 a malicious CAS Service could trick another CAS Service into authenticating a proxy ticket that was not associated. This is due to the fact that the proxy ticket authentication uses the information from the HttpServletRequest which is populated based upon untrusted information within the HTTP request. This means if there are access control restrictions on which CAS services can authenticate to one another, those restrictions can be bypassed. If users are not using CAS Proxy tickets and not basing access control decisions based upon the CAS Service, then there is no impact to users.


How to mitigate CVE-2014-3527

Install update from vendor's website.

Sources