CVE-2022-31023: Dev error stack trace leaking into prod in Play Framework
5.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.60379%
CWE
Published
6/3/2022
Updated
1/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.typesafe.play:play_2.12 | maven | < 2.8.16 | 2.8.16 |
| com.typesafe.play:play_2.13 | maven | < 2.8.16 | 2.8.16 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability documentation explicitly identifies two specific points where the static DefaultHttpErrorHandler is improperly used as a default parameter: 1) CORSFilter constructor and 2) CORSActionBuilder apply method. These static references bypass Play's environment-aware error handling configuration. The patch introduced DevHttpErrorHandler for dev-mode and modified these exact locations, confirming their vulnerability. File paths are inferred from standard Play framework structure and CORS component organization.