First published: Mon Mar 20 2023(Updated: )
A flaw found was found in Spring Framework. This flaw allows a malicious user to use a specially crafted SpEL expression that causes a denial of service (DoS).
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <0:2.401.1.1686649641-3.el8 | 0:2.401.1.1686649641-3.el8 |
redhat/jenkins | <0:2.401.1.1686680404-3.el8 | 0:2.401.1.1686680404-3.el8 |
redhat/ovirt-dependencies | <0:4.5.3-1.el8e | 0:4.5.3-1.el8e |
VMware Spring Framework | <=5.2.22 | |
VMware Spring Framework | >=5.3.0<=5.3.25 | |
VMware Spring Framework | >=6.0.0<=6.0.6 | |
IBM Watson Knowledge Catalog on-prem | <=4.x | |
redhat/springframework | <6.0.7 | 6.0.7 |
redhat/springframework | <5.3.26 | 5.3.26 |
maven/org.springframework:spring-expression | <5.2.23.RELEASE | 5.2.23.RELEASE |
maven/org.springframework:spring-expression | >=5.3.0<5.3.26 | 5.3.26 |
maven/org.springframework:spring-expression | >=6.0.0<6.0.7 | 6.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2023-20861 is a vulnerability found in Spring Framework that allows a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.
Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELEASE - 5.2.22.RELEASE, and older unsupported versions are affected.
A malicious user can exploit this vulnerability by providing a specially crafted SpEL expression.
The severity of CVE-2023-20861 is medium, with a severity value of 5.3.
To fix CVE-2023-20861, update to Spring Framework versions 6.0.7, 5.3.26, or apply the recommended patches provided by your vendor.