Headline
CVE-2023-20866: CVE-2023-20866: Session ID can be logged to the standard output stream in Spring Session
In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver.
Description
In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking.
Specifically, an application is vulnerable when the following is true:
- You are using the HeaderHttpSessionIdResolver
An application is not vulnerable if any of the following is true:
- You are not using the HeaderHttpSessionIdResolver
Affected Spring Products and Versions
Spring Session 3.0.0
Mitigation
Users of affected versions should upgrade to Spring Session 3.0.1. Releases that have fixed this issue include:
- Spring Session 3.0.1
Credit
This issue was identified and responsibly reported by Benedikt Halser from DATEV eG
Related news
In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver.