Vulnerability Description
In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vmware | Spring Boot | < 2.5.15 |
References
- https://security.netapp.com/advisory/ntap-20230601-0009/Third Party Advisory
- https://spring.io/blog/2023/05/18/spring-boot-2-5-15-and-2-6-15-available-now
- https://spring.io/security/cve-2023-20873Vendor Advisory
- https://security.netapp.com/advisory/ntap-20230601-0009/Third Party Advisory
- https://spring.io/blog/2023/05/18/spring-boot-2-5-15-and-2-6-15-available-now
- https://spring.io/security/cve-2023-20873Vendor Advisory
FAQ
What is CVE-2023-20873?
CVE-2023-20873 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected ver...
How severe is CVE-2023-20873?
CVE-2023-20873 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-20873?
Check the references section above for vendor advisories and patch information. Affected products include: Vmware Spring Boot.