Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-20873

Опубликовано: 18 мая 2023
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+.

A flaw was found in Spring Boot. This targets specifically 'spring-boot-actuator-autoconfigure' package. This issue occurs when an application is deployed to Cloud Foundry, which could be susceptible to a security bypass. Specifically, an application is vulnerable when all of the following are true:

  • You have code that can handle requests that match /cloudfoundryapplication/. Typically, this will be if there is a catch-all request mapping which matches /.
  • The application is deployed to Cloud Foundry. An application is not vulnerable if any of the following is true:
  • The application is not deployed to Cloud Foundry
  • You have disabled Cloud Foundry actuator endpoints with management.cloudfoundry.enabled set to false.
  • Your application does not have handler mappings that can handle requests to /cloudfoundryapplication/**.

Отчет

The following Red Hat products do not ship the affected software component and so are not affected:

  • Red Hat Enterprise Linux 8, 9
  • Enterprise Application Platform 6, 7, 8, XP
  • Data Grid 7, 8
  • Migration Toolkit for Runtimes
  • Red Hat Build of OptaPlanner
  • Red Hat Integration Camel-K
  • Red Hat AMQ Broker 7
  • Red Hat AMQ Clients 2
  • Red Hat AMQ Streams 2
  • Red Hat Fuse 6
  • Red Hat Fuse 7
  • Red Hat VertX 4 The following Red Hat products ship the affected software but do not enable or do not ship the vulnerable classes, and so are affected but at Low security impact.
  • Red Hat Decision Manager 7
  • Red Hat Process Automation Manager 7
  • Red Hat Single Sign-On 7

Меры по смягчению последствий

Disable Cloud Foundry actuator endpoints by setting 'management.cloudfoundry.enabled' to false.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2spring-bootNot affected
Migration Toolkit for Runtimesspring-bootNot affected
Red Hat AMQ Broker 7spring-bootNot affected
Red Hat build of OptaPlanner 8spring-bootNot affected
Red Hat Data Grid 8spring-bootNot affected
Red Hat Decision Manager 7spring-bootAffected
Red Hat Enterprise Linux 8log4j:2/log4jNot affected
Red Hat Enterprise Linux 9log4jNot affected
Red Hat Fuse 7spring-bootNot affected
Red Hat Integration Camel K 1spring-bootNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=2231491spring-boot: Security Bypass With Wildcard Pattern Matching on Cloud Foundry

EPSS

Процентиль: 56%
0.00335
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 3 года назад

In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+.

CVSS3: 9.8
github
почти 3 года назад

Spring Boot Security Bypass with Wildcard Pattern Matching on Cloud Foundry

EPSS

Процентиль: 56%
0.00335
Низкий

9.8 Critical

CVSS3