6.5
CVSSv3

CVE-2023-20866

Published: 13/04/2023 Updated: 21/04/2023
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware spring session 3.0.0

Vendor Advisories

Description<!---->A flaw was found in Spring Session If using HeaderHttpSessionIdResolver, the session id can be logged to the standard output stream This may log sensitive information and could be used by an attacker for session hijackingA flaw was found in Spring Session If using HeaderHttpSessionIdResolver, the session id can be logged to th ...