In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver.
References
Link | Resource |
---|---|
https://spring.io/security/cve-2023-20866 | Vendor Advisory |
https://spring.io/security/cve-2023-20866 | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://spring.io/security/cve-2023-20866 - Vendor Advisory |
21 Apr 2023, 18:51
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://spring.io/security/cve-2023-20866 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
First Time |
Vmware spring Session
Vmware |
|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:vmware:spring_session:3.0.0:*:*:*:*:*:*:* |
13 Apr 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-13 20:15
Updated : 2025-02-07 17:15
NVD link : CVE-2023-20866
Mitre link : CVE-2023-20866
CVE.ORG link : CVE-2023-20866
JSON object : View
Products Affected
vmware
- spring_session
CWE