In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver.
References
Link | Resource |
---|---|
https://spring.io/security/cve-2023-20866 | Vendor Advisory |
Configurations
History
21 Apr 2023, 18:51
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-13 20:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-20866
Mitre link : CVE-2023-20866
CVE.ORG link : CVE-2023-20866
JSON object : View
Products Affected
vmware
- spring_session
CWE