Miggo Logo

CVE-2023-20873: Spring Boot Security Bypass with Wildcard Pattern Matching on Cloud Foundry

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.58951%
CWE
-
Published
4/20/2023
Updated
7/8/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.springframework.boot:spring-boot-actuator-autoconfiguremaven>= 3.0.0, < 3.0.63.0.6
org.springframework.boot:spring-boot-actuator-autoconfiguremaven>= 2.7.0, < 2.7.112.7.11
org.springframework.boot:spring-boot-actuator-autoconfiguremaven>= 2.6.0, < 2.6.152.6.15
org.springframework.boot:spring-boot-actuator-autoconfiguremaven< 2.5.152.5.15

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from using broad wildcard patterns ('/cloudfoundryapplication/**') in security configurations rather than dynamically generated paths based on actual endpoints. The commit diff shows the fix replaced static path matchers with logic using PathMappedEndpoints to collect all endpoint paths, indicating the original static pattern matching in these security configuration handlers was the vulnerable code path. The affected functions handled security filter chain configuration for Cloud Foundry deployments.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In Sprin* *oot v*rsions *.*.* - *.*.*, *.*.* - *.*.**, *n* ol**r unsupport** v*rsions, *n *ppli**tion t**t is **ploy** to *lou* *oun*ry *oul* ** sus**pti*l* to * s**urity *yp*ss. Us*rs o* *****t** v*rsions s*oul* *pply t** *ollowin* miti**tion: *.*.x

Reasoning

T** vuln*r**ility st*mm** *rom usin* *ro** wil***r* p*tt*rns ('/*lou**oun*ry*ppli**tion/**') in s**urity *on*i*ur*tions r*t**r t**n *yn*mi**lly **n*r*t** p*t*s **s** on **tu*l *n*points. T** *ommit *i** s*ows t** *ix r*pl**** st*ti* p*t* m*t***rs wit