CVE-2023-20873

In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:41

Type Values Removed Values Added
References () https://security.netapp.com/advisory/ntap-20230601-0009/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20230601-0009/ - Third Party Advisory
References () https://spring.io/blog/2023/05/18/spring-boot-2-5-15-and-2-6-15-available-now - () https://spring.io/blog/2023/05/18/spring-boot-2-5-15-and-2-6-15-available-now -
References () https://spring.io/security/cve-2023-20873 - Vendor Advisory () https://spring.io/security/cve-2023-20873 - Vendor Advisory

28 Aug 2023, 13:15

Type Values Removed Values Added
References
  • (MISC) https://spring.io/blog/2023/05/18/spring-boot-2-5-15-and-2-6-15-available-now -

02 Aug 2023, 16:19

Type Values Removed Values Added
References (CONFIRM) https://security.netapp.com/advisory/ntap-20230601-0009/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20230601-0009/ - Third Party Advisory

01 Jun 2023, 14:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20230601-0009/ -

Information

Published : 2023-04-20 21:15

Updated : 2024-11-21 07:41


NVD link : CVE-2023-20873

Mitre link : CVE-2023-20873

CVE.ORG link : CVE-2023-20873


JSON object : View

Products Affected

vmware

  • spring_boot