CVE-2023-20873: Spring Boot Security Bypass with Wildcard Pattern Matching on Cloud Foundry
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.58951%
CWE
-
Published
4/20/2023
Updated
7/8/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.springframework.boot:spring-boot-actuator-autoconfigure | maven | >= 3.0.0, < 3.0.6 | 3.0.6 |
org.springframework.boot:spring-boot-actuator-autoconfigure | maven | >= 2.7.0, < 2.7.11 | 2.7.11 |
org.springframework.boot:spring-boot-actuator-autoconfigure | maven | >= 2.6.0, < 2.6.15 | 2.6.15 |
org.springframework.boot:spring-boot-actuator-autoconfigure | maven | < 2.5.15 | 2.5.15 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from using broad wildcard patterns ('/cloudfoundryapplication/**') in security configurations rather than dynamically generated paths based on actual endpoints. The commit diff shows the fix replaced static path matchers with logic using PathMappedEndpoints
to collect all endpoint paths, indicating the original static pattern matching in these security configuration handlers was the vulnerable code path. The affected functions
handled security filter chain configuration for Cloud Foundry deployments.