9.8 CVE-2023-20862
In Spring Security, versions 5.7.x prior to 5.7.8, versions 5.8.x prior to 5.8.3, and versions 6.0.x prior to 6.0.3, the logout support does not properly clean the security context if using serialized versions. Additionally, it is not possible to explicitly save an empty security context to the HttpSessionSecurityContextRepository. This vulnerability can keep users authenticated even after they performed logout. Users of affected versions should apply the following mitigation. 5.7.x users should upgrade to 5.7.8. 5.8.x users should upgrade to 5.8.3. 6.0.x users should upgrade to 6.0.3.
https://nvd.nist.gov/vuln/detail/CVE-2023-20862
Categories
CWE-459 : Incomplete Cleanup
The product does not properly "clean up" and remove temporary or supporting resources after they have been used. Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.) Temporary files and other supporting resources should be deleted/released immediately after they are no longer needed. World-readable temporary file not deleted after use. Temporary file not deleted after use, leaking database usernames and passwords. Interaction error creates a temporary file that can not be deleted due to strong permissions. Alternate data streams for NTFS files are not cleared when files are wiped (alternate channel / infoleak). Alternate data streams for NTFS files are not cleared when files are wiped (alternate channel / infoleak). Alternate data streams for NTFS files are not cleared when files are wiped (alternate channel / infoleak). Alternate data streams for NTFS files are not cleared when files are wiped (alternate channel / infoleak). Alternate data streams for NTFS files are not cleared when files are wiped (alternate channel / infoleak). Users not logged out when application is restarted after security-relevant changes were made.
References
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* | >= 6.0.0 | < 6.0.3 |
cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* | >= 5.8.0 | < 5.8.3 |
cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* | >= 5.7.0 | < 5.7.8 |
REMEDIATION
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
Other (github, ...)
Url |
---|
No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
No entry |
MITRE
Sherlock® flash
Take a picture of your computer network in a few clicks !
The Sherlock® flash audit solution allows you to perform an audit to strengthen the security of your IT assets. Vulnerability analysis of your physical and virtual equipment. Patch planning by priority level and time available. Detailed and intuitive reporting.
