First published: Wed Apr 19 2023(Updated: )
In Spring Security, versions 5.7.x prior to 5.7.8, versions 5.8.x prior to 5.8.3, and versions 6.0.x prior to 6.0.3, the logout support does not properly clean the security context if using serialized versions. Additionally, it is not possible to explicitly save an empty security context to the HttpSessionSecurityContextRepository. This vulnerability can keep users authenticated even after they performed logout. Users of affected versions should apply the following mitigation. 5.7.x users should upgrade to 5.7.8. 5.8.x users should upgrade to 5.8.3. 6.0.x users should upgrade to 6.0.3.
Credit: security@vmware.com security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.springframework.security:spring-security-core | >=6.0.0<6.0.3 | 6.0.3 |
maven/org.springframework.security:spring-security-core | >=5.8.0<5.8.3 | 5.8.3 |
maven/org.springframework.security:spring-security-core | >=5.7.0<5.7.8 | 5.7.8 |
redhat/spring-security | <5.7.8 | 5.7.8 |
redhat/spring-security | <5.8.3 | 5.8.3 |
redhat/spring-security | <6.0.3 | 6.0.3 |
Vmware Spring Security | >=5.7.0<5.7.8 | |
Vmware Spring Security | >=5.8.0<5.8.3 | |
Vmware Spring Security | >=6.0.0<6.0.3 | |
Netapp Active Iq Unified Manager Linux | ||
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20862 is a vulnerability in Spring Security versions 5.7.x prior to 5.7.8, versions 5.8.x prior to 5.8.3, and versions 6.0.x prior to 6.0.3 that affects the logout support feature.
CVE-2023-20862 impacts Spring Security by not properly cleaning the security context during logout if using serialized versions, and by not allowing saving an empty security context to the Http.
CVE-2023-20862 has a severity keyword of 'medium' and a CVSS severity value of 6.3.
To fix CVE-2023-20862, you should upgrade to Spring Security versions 5.7.8, 5.8.3, or 6.0.3.
You can find more information about CVE-2023-20862 at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-20862), [Spring Security](https://spring.io/security/cve-2023-20862), [Netapp Advisory](https://security.netapp.com/advisory/ntap-20230526-0002/).