CVE-2023-20866

In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver.
References
Link Resource
https://spring.io/security/cve-2023-20866 Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:vmware:spring_session:3.0.0:*:*:*:*:*:*:*

History

21 Apr 2023, 18:51

Type Values Removed Values Added
References (MISC) https://spring.io/security/cve-2023-20866 - (MISC) https://spring.io/security/cve-2023-20866 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:vmware:spring_session:3.0.0:*:*:*:*:*:*:*
First Time Vmware spring Session
Vmware

13 Apr 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-13 20:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-20866

Mitre link : CVE-2023-20866

CVE.ORG link : CVE-2023-20866


JSON object : View

Products Affected

vmware

  • spring_session
CWE
NVD-CWE-noinfo CWE-200

Exposure of Sensitive Information to an Unauthorized Actor