CVE-2023-20866 – org.springframework.session:spring-session-core
Package
Manager: maven
Name: org.springframework.session:spring-session-core
Vulnerable Version: =3.0.0 || >=3.0.0 <3.0.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00369 pctl0.57994
Details
Spring Session session ID can be logged to the standard output stream In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver.
Metadata
Created: 2023-04-13T21:30:27Z
Modified: 2023-04-22T00:06:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-r7qr-f43m-pxfr/GHSA-r7qr-f43m-pxfr.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-r7qr-f43m-pxfr
Finding: F017
Auto approve: 1