Skip to main content

CVE-2022-31690: Privilege Escalation in spring-security-oauth2-client in Spring Security

High
VulnerabilityCVE-2022-31690cvecve-2022-31690
Published: Mon Oct 31 2022 (10/31/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Spring Security

Description

Spring Security, versions 5.7 prior to 5.7.5, and 5.6 prior to 5.6.9, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can modify a request initiated by the Client (via the browser) to the Authorization Server which can lead to a privilege escalation on the subsequent approval. This scenario can happen if the Authorization Server responds with an OAuth2 Access Token Response containing an empty scope list (per RFC 6749, Section 5.1) on the subsequent request to the token endpoint to obtain the access token.

AI-Powered Analysis

AILast updated: 07/05/2025, 04:54:56 UTC

Technical Analysis

CVE-2022-31690 is a high-severity privilege escalation vulnerability affecting Spring Security's OAuth2 client module in versions 5.7 prior to 5.7.5, 5.6 prior to 5.6.9, and older unsupported versions. The vulnerability arises when a malicious user or attacker manipulates the OAuth2 authorization flow by modifying a client-initiated request to the Authorization Server. Specifically, if the Authorization Server returns an OAuth2 Access Token Response with an empty scope list (as permitted by RFC 6749, Section 5.1), the client may incorrectly grant elevated privileges during the subsequent token approval process. This flaw can lead to unauthorized privilege escalation without requiring authentication or user interaction. The vulnerability exploits the way Spring Security processes OAuth2 token responses, allowing attackers to gain higher access rights than intended. The CVSS v3.1 score is 8.1 (high), reflecting the network attack vector, high impact on confidentiality, integrity, and availability, and no required privileges or user interaction. No known exploits in the wild have been reported to date, but the vulnerability poses a significant risk to applications relying on vulnerable Spring Security versions for OAuth2 client authentication and authorization.

Potential Impact

For European organizations, this vulnerability poses a critical risk especially for enterprises and public sector entities that use Spring Security for OAuth2-based authentication and authorization in their web applications and APIs. Exploitation could allow attackers to escalate privileges, potentially accessing sensitive data, modifying application behavior, or disrupting services. This can lead to data breaches, compliance violations (e.g., GDPR), and operational disruptions. Given the widespread adoption of Spring Security in Europe’s software ecosystem, including financial institutions, healthcare providers, and government agencies, the impact could be extensive. Attackers exploiting this vulnerability could bypass intended access controls, leading to unauthorized data access or manipulation. The lack of required authentication or user interaction lowers the barrier for exploitation, increasing the threat level. Additionally, compromised applications could be used as pivot points for further attacks within organizational networks.

Mitigation Recommendations

European organizations should immediately assess their use of Spring Security versions and prioritize upgrading to versions 5.7.5 or 5.6.9 and later, where this vulnerability is patched. If immediate upgrading is not feasible, organizations should implement strict validation of OAuth2 token responses, ensuring that empty scope lists are handled securely and do not result in privilege escalation. Application-level mitigations include enforcing least privilege principles, adding additional authorization checks post-token acquisition, and monitoring OAuth2 token exchange logs for anomalies such as empty scopes or unexpected token responses. Network-level controls such as restricting access to the Authorization Server and token endpoints to trusted clients and IP ranges can reduce exposure. Security teams should also conduct thorough penetration testing focused on OAuth2 flows to detect potential exploitation attempts. Finally, organizations should stay alert for any emerging exploit reports and apply security advisories promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
vmware
Date Reserved
2022-05-25T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd8181

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 4:54:56 AM

Last updated: 7/31/2025, 12:27:34 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats