First published: Fri Jul 14 2023(Updated: )
Thymeleaf through 3.1.1.RELEASE as used in spring-boot-admin (aka Spring Boot Admin) through 3.1.1 allows for a sandbox bypass via crafted HTML. This may be relevant for SSTI (Server Side Template Injection) and code execution in spring-boot-admin if MailNotifier is enabled and there is write access to environment variables via the UI. Spring Boot Admin 3.1.2 and 2.7.16 contain mitigations for the issue. This bypass is achived via a library called Thymeleaf which has added counter measures for this sort of bypass in version `3.1.2.RELEASE` which has explicity forbidden static access to `org.springframework.util` in expressions. Thymeleaf itself should not be considered vulnerable.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/de.codecentric:spring-boot-admin-server | <2.7.16 | 2.7.16 |
maven/de.codecentric:spring-boot-admin-server | >=3.0.0<3.1.2 | 3.1.2 |
Spring Boot Admin | <=3.1.0 | |
Thymeleaf | <=3.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-38286.
CVE-2023-38286 has a severity rating of 7.5, which is considered high.
This vulnerability can be exploited through crafted HTML, potentially leading to server-side template injection (SSTI) and code execution.
Products such as spring-boot-admin (Spring Boot Admin) versions up to 3.1.1, Codecentric Spring Boot Admin up to 3.1.0, and Thymeleaf up to 3.1.1 are affected by CVE-2023-38286.
To fix CVE-2023-38286, update the spring-boot-admin package to version 3.1.2, or check for updates from the respective product vendors.