CVE-2023-20866
Published on: Not Yet Published
Last Modified on: 04/21/2023 06:51:00 PM UTC
Certain versions of Spring Session from Vmware contain the following vulnerability:
In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver.
- CVE-2023-20866 has been assigned by
secu[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 6.5 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
CVE-2023-20866: Session ID can be logged to the standard output stream in Spring Session | spring.io text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Vmware | Spring Session | 3.0.0 | All | All | All |
- cpe:2.3:a:vmware:spring_session:3.0.0:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE report published for Spring Session, consider updating your application if they are affected. More details in spring.io/security/cve-2… | 2023-04-12 12:13:35 |
![]() |
CVE-2023-20866 : In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This… twitter.com/i/web/status/1… | 2023-04-13 20:04:15 |