Open mend-bolt-for-github[bot] opened 11 months ago
Thank you for opening an issue. If this issue is related to a bug, please follow the steps and provide the information outlined in the Troubleshooting Guide. Failure to follow these instructions may result in automatic closing of this issue.
CVE-2023-20873 - Critical Severity Vulnerability
Vulnerable Library - spring-boot-actuator-autoconfigure-2.7.5.jar
Spring Boot Actuator AutoConfigure
Library home page: https://spring.io/projects/spring-boot
Dependency Hierarchy: - webdocs-actuator-0.1.0-SNAPSHOT.jar (Root Library) - webdocs-commons-0.1.0-SNAPSHOT.jar - spring-boot-starter-actuator-2.7.5.jar - :x: **spring-boot-actuator-autoconfigure-2.7.5.jar** (Vulnerable Library)
Found in HEAD commit: c7ec20e7636517fb8d076d86cdac3414ca4c5842
Found in base branch: master
Vulnerability Details
In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+.
Publish Date: 2023-04-20
URL: CVE-2023-20873
CVSS 3 Score Details (9.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2023-20873
Release Date: 2023-04-20
Fix Resolution: org.springframework.boot:spring-boot-actuator-autoconfigure:2.7.11,3.0.6
Step up your Open Source Security Game with Mend here