
20/9/2023

20/9/2023

24/9/2024
CVE-2023-34047: Exposure of data and identity to wrong session in Spring for GraphQL
First published: Wed Sep 20 2023(Updated: )
A batch loader function in Spring for GraphQL versions 1.1.0 - 1.1.5 and 1.2.0 - 1.2.2 may be exposed to GraphQL context with values, including security context values, from a different session. An application is vulnerable if it provides a DataLoaderOptions instance when registering batch loader functions through DefaultBatchLoaderRegistry.
Credit: security@vmware.com security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|
maven/org.springframework.graphql:spring-graphql | >=1.2.0<1.2.3 | 1.2.3 |
maven/org.springframework.graphql:spring-graphql | >=1.1.0<1.1.6 | 1.1.6 |
vmware Spring for GraphQL | >=1.1.0<=1.1.5 | |
vmware Spring for GraphQL | >=1.2.0<=1.2.2 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2023-34047?
The severity of CVE-2023-34047 is low with a severity value of 3.1.
Which versions of Spring for GraphQL are affected by CVE-2023-34047?
Versions 1.1.0 - 1.1.5 and 1.2.0 - 1.2.2 of Spring for GraphQL are affected by CVE-2023-34047.
What is the vulnerability of CVE-2023-34047?
CVE-2023-34047 is a vulnerability where a batch loader function in Spring for GraphQL may expose values from a different session.
How can I fix CVE-2023-34047?
To fix CVE-2023-34047, update to version 1.1.6 or higher for versions 1.1.0 - 1.1.5, and update to version 1.2.3 or higher for versions 1.2.0 - 1.2.2 of Spring for GraphQL.
Where can I find more information about CVE-2023-34047?
You can find more information about CVE-2023-34047 at the following references: [1] https://spring.io/security/cve-2023-34047, [2] https://nvd.nist.gov/vuln/detail/CVE-2023-34047, [3] https://github.com/advisories/GHSA-frqc-f2h8-fjvf.
- collector/nvd-index
- collector/nvd-cve
- collector/github-advisory-latest
- alias/GHSA-frqc-f2h8-fjvf
- alias/CVE-2023-34047
- collector/github-advisory
- agent/type
- agent/softwarecombine
- collector/mitre-cve
- source/MITRE
- agent/references
- agent/severity
- agent/title
- agent/last-modified-date
- agent/author
- agent/description
- agent/first-publish-date
- agent/event
- agent/trending
- agent/source
- agent/tags
- collector/nvd-api
- agent/software-canonical-lookup-request
- vendor/vmware
- canonical/vmware spring for graphql
- version/vmware spring for graphql/1.1.0
- version/vmware spring for graphql/1.1.5
- version/vmware spring for graphql/1.2.0
- version/vmware spring for graphql/1.2.2
- package-manager/maven
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203