CVE-2023-34034: WebFlux Security Bypass With Un-Prefixed Double Wildcard Pattern

HIGH | JULY 18, 2023 | CVE-2023-34034

Description

Using "**" as a pattern in Spring Security configuration for WebFlux creates a mismatch in pattern matching between Spring Security and Spring WebFlux, and the potential for a security bypass.

Affected Spring Products and Versions

Spring Security:

  • 6.1.0 to 6.1.1
  • 6.0.0 to 6.0.4
  • 5.8.0 to 5.8.4
  • 5.7.0 to 5.7.9
  • 5.6.0 to 5.6.11

CVE-2023-20883: Spring Boot Welcome Page DoS Vulnerability

HIGH | MAY 19, 2023 | CVE-2023-20883

Description

In Spring Boot versions 3.0.0 - 3.0.6, 2.7.0 - 2.7.11, 2.6.0 - 2.6.14, 2.5.0 - 2.5.14 and older unsupported versions, there is potential for a denial-of-service (DoS) attack if Spring MVC is used together with a reverse proxy cache.

Specifically…

CVE-2023-20863: Spring Expression DoS Vulnerability

HIGH | APRIL 13, 2023 | CVE-2023-20863

Description

In Spring Framework versions 6.0.0 - 6.0.7, 5.3.0 - 5.3.26, 5.2.0.RELEASE - 5.2.23.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.

CVE-2023-20859: Insertion of Sensitive Information into Log Sourced from Failed Revocation of Tokens

MEDIUM | MARCH 20, 2023 | CVE-2023-20859

Description

In Spring Vault, versions 3.0.x prior to 3.0.2 and versions 2.3.x prior to 2.3.3 and older versions, an application is vulnerable to insertion of sensitive information into a log file when it attempts to revoke a Vault batch token.

Specifically, an application is vulnerable when all of the following are true:

  • The authentication mechanism creates Batch tokens.
  • Usage of LifecycleAwareSessionManager in an imperative-only arrangement.
  • LifecycleAwareSessionManager.destroy() is called by the application or the application shutdown hook
  • The logging level for LifecycleAwareSessionManager or org.springframework.vault.authentication is set at least to WARN

CVE-2023-20860: Security Bypass With Un-Prefixed Double Wildcard Pattern

HIGH | MARCH 20, 2023 | CVE-2023-20860

Description

Using "**" as a pattern in Spring Security configuration with the mvcRequestMatcher creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.

Affected Spring Products and Versions

  • Spring Framework:
    • 6.0.0 to 6.0.6
    • 5.3.0 to 5.3.25
    • Versions older than 5.3 are not affected

Get ahead

VMware offers training and certification to turbo-charge your progress.

Learn more

Get support

Tanzu Spring offers support and binaries for OpenJDK™, Spring, and Apache Tomcat® in one simple subscription.

Learn more

Upcoming events

Check out all the upcoming events in the Spring community.

View all