logo

CVE-2023-20866 org.springframework.session:spring-session-core

Package

Manager: maven
Name: org.springframework.session:spring-session-core
Vulnerable Version: =3.0.0 || >=3.0.0 <3.0.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00369 pctl0.57994

Details

Spring Session session ID can be logged to the standard output stream In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver.

Metadata

Created: 2023-04-13T21:30:27Z
Modified: 2023-04-22T00:06:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-r7qr-f43m-pxfr/GHSA-r7qr-f43m-pxfr.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-r7qr-f43m-pxfr
Finding: F017
Auto approve: 1