View all vulnerabilities

CVE-2023-20873

Spring Boot Security Bypass with Wildcard Pattern Matching on Cloud Foundry

In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+.

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
9.8
Score Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Versions
org.springframework.boot:spring-boot-actuator-autoconfigure >= 3.0.0 < 3.0.6; org.springframework.boot:spring-boot-actuator-autoconfigure >= 2.7.0 < 2.7.11; org.springframework.boot:spring-boot-actuator-autoconfigure >= 2.6.0 < 2.6.15; org.springframework.boot:spring-boot-actuator-autoconfigure < 2.5.15
Severity
Ecosystem
Publish Date
April 20, 2023
Modified Date
December 6, 2024