CVE-2023-20866

In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:vmware:spring_session:3.0.0:*:*:*:*:*:*:*

History

07 Feb 2025, 17:15

Type Values Removed Values Added
References (MISC) https://spring.io/security/cve-2023-20866 - Vendor Advisory () https://spring.io/security/cve-2023-20866 - Vendor Advisory

21 Apr 2023, 18:51

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
First Time Vmware
Vmware spring Session
CPE cpe:2.3:a:vmware:spring_session:3.0.0:*:*:*:*:*:*:*
References (MISC) https://spring.io/security/cve-2023-20866 - (MISC) https://spring.io/security/cve-2023-20866 - Vendor Advisory
CWE NVD-CWE-noinfo

13 Apr 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-13 20:15

Updated : 2025-02-07 17:15


NVD link : CVE-2023-20866

Mitre link : CVE-2023-20866


JSON object : View

Products Affected

vmware

  • spring_session