logo

CVE-2023-38286 de.codecentric:spring-boot-admin-server

Package

Manager: maven
Name: de.codecentric:spring-boot-admin-server
Vulnerable Version: >=3.0.0 <3.1.2 || >=0 <2.7.16

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00114 pctl0.3064

Details

Spring-boot-admin sandbox bypass via crafted HTML Thymeleaf through 3.1.1.RELEASE as used in spring-boot-admin (aka Spring Boot Admin) through 3.1.1 allows for a sandbox bypass via crafted HTML. This may be relevant for SSTI (Server Side Template Injection) and code execution in spring-boot-admin if MailNotifier is enabled and there is write access to environment variables via the UI. Spring Boot Admin 3.1.2 and 2.7.16 contain mitigations for the issue. This bypass is achived via a library called Thymeleaf which has added counter measures for this sort of bypass in version `3.1.2.RELEASE` which has explicity forbidden static access to `org.springframework.util` in expressions. Thymeleaf itself should not be considered vulnerable.

Metadata

Created: 2023-07-14T06:31:00Z
Modified: 2024-06-12T22:40:52Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-7gj7-224w-vpr3/GHSA-7gj7-224w-vpr3.json
CWE IDs: ["CWE-77"]
Alternative ID: GHSA-7gj7-224w-vpr3
Finding: F422
Auto approve: 1