Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-20866

Опубликовано: 13 апр. 2023
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver.

A flaw was found in Spring Session. If using HeaderHttpSessionIdResolver, the session id can be logged to the standard output stream. This may log sensitive information and could be used by an attacker for session hijacking.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Data Grid 8spring-sessionNot affected
Red Hat JBoss Data Grid 7spring-sessionNot affected
Red Hat JBoss Enterprise Application Platform 7spring-sessionNot affected
Red Hat JBoss Enterprise Application Platform Expansion Packspring-sessionNot affected
Red Hat OpenShift Dev Spacesdevspaces-pluginregistry-rhel8-container=newNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-117
https://bugzilla.redhat.com/show_bug.cgi?id=2193230spring-session: Improper log of session id in standard output stream

EPSS

Процентиль: 64%
0.00462
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
почти 3 года назад

In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver.

CVSS3: 6.5
github
почти 3 года назад

Spring Session session ID can be logged to the standard output stream

EPSS

Процентиль: 64%
0.00462
Низкий

6.5 Medium

CVSS3