ID CVE-2021-22096
Summary In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.
References
Vulnerable Configurations
  • cpe:2.3:a:vmware:spring_framework:5.2.0:-:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.0:-:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.0:milestone1:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.0:milestone1:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.0:milestone2:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.0:milestone2:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.0:milestone3:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.0:milestone3:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.13:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.13:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.14:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.14:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.15:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.15:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.16:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.16:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.2.17:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.2.17:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.3.0:-:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.3.0:-:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.3.0:milestone1:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.3.0:milestone1:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.3.0:milestone2:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.3.0:milestone2:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.3.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.3.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.3.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.3.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.3.9:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:spring_framework:5.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:spring_framework:5.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
    cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
  • cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
    cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
  • cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:metrocluster_tiebreaker:-:*:*:*:*:clustered_data_ontap:*:*
    cpe:2.3:a:netapp:metrocluster_tiebreaker:-:*:*:*:*:clustered_data_ontap:*:*
  • cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*
    cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*
  • cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.15.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.15.0:*:*:*:*:*:*:*
CVSS
Base: 4.0 (as of 28-04-2022 - 14:53)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:S/C:N/I:P/A:N
Last major update 28-04-2022 - 14:53
Published 28-10-2021 - 16:15
Last modified 28-04-2022 - 14:53
Back to Top