Miggo Logo

CVE-2022-31023: Dev error stack trace leaking into prod in Play Framework

5.9

CVSS Score
3.1

Basic Information

EPSS Score
0.60379%
Published
6/3/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.typesafe.play:play_2.12maven< 2.8.162.8.16
com.typesafe.play:play_2.13maven< 2.8.162.8.16

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability documentation explicitly identifies two specific points where the static DefaultHttpErrorHandler is improperly used as a default parameter: 1) CORSFilter constructor and 2) CORSActionBuilder apply method. These static references bypass Play's environment-aware error handling configuration. The patch introduced DevHttpErrorHandler for dev-mode and modified these exact locations, confirming their vulnerability. File paths are inferred from standard Play framework structure and CORS component organization.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t Pl*y *r*m*work, w**n run in **v mo**, s*ows v*r*os* *rrors *or **sy ***u**in*, in*lu*in* *n *x**ption st**k tr***. Pl*y *o*s t*is *y *on*i*urin* its `****ult*ttp*rror**n*l*r` to *o so **s** on t** *ppli**tion mo**. In its S**l* *PI Pl*y *

Reasoning

T** vuln*r**ility *o*um*nt*tion *xpli*itly i**nti*i*s two sp**i*i* points w**r* t** st*ti* `****ult*ttp*rror**n*l*r` is improp*rly us** *s * ****ult p*r*m*t*r: *) `*ORS*ilt*r` *onstru*tor *n* *) `*ORS**tion*uil**r` *pply m*t*o*. T**s* st*ti* r***r*n*