CVE-2023-20866

In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:vmware:spring_session:3.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:41

Type Values Removed Values Added
References () https://spring.io/security/cve-2023-20866 - Vendor Advisory () https://spring.io/security/cve-2023-20866 - Vendor Advisory

21 Apr 2023, 18:51

Type Values Removed Values Added
References (MISC) https://spring.io/security/cve-2023-20866 - (MISC) https://spring.io/security/cve-2023-20866 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
First Time Vmware spring Session
Vmware
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:vmware:spring_session:3.0.0:*:*:*:*:*:*:*

13 Apr 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-13 20:15

Updated : 2025-02-07 17:15


NVD link : CVE-2023-20866

Mitre link : CVE-2023-20866

CVE.ORG link : CVE-2023-20866


JSON object : View

Products Affected

vmware

  • spring_session
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo