CVE-2021-22112

Summary

CVECVE-2021-22112
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2021-02-23 19:15:00 UTC
Updated2023-11-07 03:30:00 UTC
DescriptionSpring Security 5.4.x prior to 5.4.4, 5.3.x prior to 5.3.8.RELEASE, 5.2.x prior to 5.2.9.RELEASE, and older unsupported versions can fail to save the SecurityContext if it is changed more than once in a single request.A malicious user cannot cause the bug to happen (it must be programmed in). However, if the application's intent is to only allow the user to run with elevated privileges in a small portion of the application, the bug can be leveraged to extend those privileges to the rest of the application.

Risk And Classification

Problem Types: NVD-CWE-noinfo

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Oracle Communications Element Manager All All All All
Application Oracle Communications Interactive Session Recorder 6.3 All All All
Application Oracle Communications Interactive Session Recorder 6.4 All All All
Application Oracle Communications Unified Inventory Management 7.4.1 All All All
Application Oracle Hospitality Cruise Shipboard Property Management System 20.1.0 All All All
Application Oracle Insurance Policy Administration 11.2.0 All All All
Application Oracle Insurance Policy Administration 11.3.0 All All All
Application Oracle Mysql Enterprise Monitor All All All All
Application Pivotal Software Spring Security All All All All
Application Pivotal Software Spring Security All All All All
Application Vmware Spring Security All All All All

References

ReferenceSourceLinkTags
[portals-pluto-dev] 20210623 [jira] [Closed] (PLUTO-786) Upgrade to version Spring Framework 5.3.7 and Spring Security 5.5.0 due to CVE-2021-22112 lists.apache.org
oss-security - Vulnerability in Jenkins MLIST www.openwall.com Mailing List, Third Party Advisory
CVE-2021-22112: Changing SecurityContext More Than Once in Single Request Can Fail to Save | Security | VMware Tanzu MISC tanzu.vmware.com Vendor Advisory
Pony Mail! MLIST lists.apache.org
[portals-pluto-dev] 20210714 [jira] [Updated] (PLUTO-786) Upgrade to version Spring Framework 5.3.7 and Spring Security 5.5.1 due to CVE-2021-22112 and CVE-2021-22119 lists.apache.org
[portals-pluto-scm] 20210623 [portals-pluto] branch master updated: PLUTO-786 Upgrade to version Spring Framework 5.3.7 and Spring Security 5.5.0 due to CVE-2021-22112 lists.apache.org
[nifi-issues] 20210510 [GitHub] [nifi] exceptionfactory opened a new pull request #5066: NIFI-8502 Upgrade Spring Framework to 5.3.6 lists.apache.org
Pony Mail! MLIST lists.apache.org
[portals-pluto-scm] 20210714 [portals-pluto] branch master updated: PLUTO-786 Upgrade to version Spring Framework 5.3.7 and Spring Security 5.5.1 due to CVE-2021-22112 and CVE-2021-22119 lists.apache.org
[portals-pluto-dev] 20210714 [jira] [Reopened] (PLUTO-786) Upgrade to version Spring Framework 5.3.7 and Spring Security 5.5.0 due to CVE-2021-22112 lists.apache.org
[portals-pluto-dev] 20210714 [jira] [Closed] (PLUTO-786) Upgrade to version Spring Framework 5.3.7 and Spring Security 5.5.1 due to CVE-2021-22112 and CVE-2021-22119 lists.apache.org
Pony Mail! MLIST lists.apache.org
Oracle Critical Patch Update Advisory - July 2021 N/A www.oracle.com
Pony Mail! MLIST lists.apache.org
Pony Mail! MLIST lists.apache.org
[portals-pluto-dev] 20210714 [jira] [Reopened] (PLUTO-786) Upgrade to version Spring Framework 5.3.7 and Spring Security 5.5.1 due to CVE-2021-22112 and CVE-2021-22119 lists.apache.org
Oracle Critical Patch Update Advisory - October 2021 MISC www.oracle.com
Pony Mail! MLIST lists.apache.org
[portals-pluto-dev] 20210623 [jira] [Updated] (PLUTO-786) Upgrade to version Spring Framework 5.3.7 and Spring Security 5.5.0 due to CVE-2021-22112 lists.apache.org
Pony Mail! MLIST lists.apache.org
Pony Mail! MLIST lists.apache.org
Pony Mail! MLIST lists.apache.org
[portals-pluto-dev] 20210714 [jira] [Comment Edited] (PLUTO-786) Upgrade to version Spring Framework 5.3.7 and Spring Security 5.5.1 due to CVE-2021-22112 and CVE-2021-22119 lists.apache.org
Oracle Critical Patch Update Advisory - April 2021 MISC www.oracle.com
Pony Mail! MLIST lists.apache.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 11718 Jenkins Core Privilege Escalation Vulnerability(Jenkins Security Advisory 2021-02-19)
  • 980335 Java (maven) Security Update for org.springframework.security:spring-security-web (GHSA-gq28-h5vg-8prx)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report