9.8 CVE-2023-20862

 

In Spring Security, versions 5.7.x prior to 5.7.8, versions 5.8.x prior to 5.8.3, and versions 6.0.x prior to 6.0.3, the logout support does not properly clean the security context if using serialized versions. Additionally, it is not possible to explicitly save an empty security context to the HttpSessionSecurityContextRepository. This vulnerability can keep users authenticated even after they performed logout. Users of affected versions should apply the following mitigation. 5.7.x users should upgrade to 5.7.8. 5.8.x users should upgrade to 5.8.3. 6.0.x users should upgrade to 6.0.3.
https://nvd.nist.gov/vuln/detail/CVE-2023-20862

Categories

CWE-459 : Incomplete Cleanup
The product does not properly "clean up" and remove temporary or supporting resources after they have been used. Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.) Temporary files and other supporting resources should be deleted/released immediately after they are no longer needed. World-readable temporary file not deleted after use. Temporary file not deleted after use, leaking database usernames and passwords. Interaction error creates a temporary file that can not be deleted due to strong permissions. Alternate data streams for NTFS files are not cleared when files are wiped (alternate channel / infoleak). Alternate data streams for NTFS files are not cleared when files are wiped (alternate channel / infoleak). Alternate data streams for NTFS files are not cleared when files are wiped (alternate channel / infoleak). Alternate data streams for NTFS files are not cleared when files are wiped (alternate channel / infoleak). Alternate data streams for NTFS files are not cleared when files are wiped (alternate channel / infoleak). Users not logged out when application is restarted after security-relevant changes were made.

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* >= 6.0.0 < 6.0.3
cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* >= 5.8.0 < 5.8.3
cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* >= 5.7.0 < 5.7.8


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

Other (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry


MITRE