First published: Thu Apr 20 2023(Updated: )
In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+.
Credit: security@vmware.com security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/spring-boot | <2.5.15 | 2.5.15 |
redhat/spring-boot | <2.6.15 | 2.6.15 |
redhat/spring-boot | <2.7.11 | 2.7.11 |
redhat/spring-boot | <3.0.6 | 3.0.6 |
maven/org.springframework.boot:spring-boot-actuator-autoconfigure | <2.5.15 | 2.5.15 |
maven/org.springframework.boot:spring-boot-actuator-autoconfigure | >=2.6.0<2.6.15 | 2.6.15 |
maven/org.springframework.boot:spring-boot-actuator-autoconfigure | >=2.7.0<2.7.11 | 2.7.11 |
maven/org.springframework.boot:spring-boot-actuator-autoconfigure | >=3.0.0<3.0.6 | 3.0.6 |
VMware Spring Boot | <2.5.15 | |
VMware Spring Boot | >=2.6.0<2.6.14 | |
VMware Spring Boot | >=2.7.0<2.7.11 | |
VMware Spring Boot | >=3.0.0<3.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20873 is a vulnerability in Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions that could lead to a security bypass.
CVE-2023-20873 has a severity rating of 9.8 out of 10, making it a critical vulnerability.
To mitigate CVE-2023-20873, users of affected versions should upgrade to Spring Boot 3.0.6+ or 2.7.11+ depending on the version being used.
Additional information about CVE-2023-20873 can be found at the following references: https://security.netapp.com/advisory/ntap-20230601-0009/ and https://spring.io/blog/2023/05/18/spring-boot-2-5-15-and-2-6-15-available-now