Spring Security Advisories

CVE-2023-20861: Spring Expression DoS Vulnerability

MEDIUM | MARCH 24, 2023 | CVE-2023-20861

Description

In Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELEASE - 5.2.22.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.

Affected Spring Products and Versions

  • Spring Framework
    • 6.0.0 to 6.0.6
    • 5.3.0 to 5.3.25
    • 5.2.0.RELEASE to 5.2.22.RELEASE
    • Older, unsupported versions are also affected

Mitigation

Users of affected versions should apply the following mitigation: 6.0.x users should upgrade to 6.0.7+. 5.3.x users should upgrade to 5.3.26+. 5.2.x users should upgrade to 5.2.23.RELEASE+. Users of older, unsupported versions should upgrade to 6.0.7+ or 5.3.26+. No other steps are necessary. Releases that have fixed this issue include:

  • Spring Framework
    • 6.0.7+
    • 5.3.26+
    • 5.2.23.RELEASE+

Credit

This vulnerability was initially discovered and responsibly reported by the Google OSS-Fuzz team from Code Intelligence.

History

  • 2023-03-20: Initial vulnerability report published.

Get ahead

VMware offers training and certification to turbo-charge your progress.

Learn more

Get support

Tanzu Spring Runtime offers support and binaries for OpenJDK™, Spring, and Apache Tomcat® in one simple subscription.

Learn more

Upcoming events

Check out all the upcoming events in the Spring community.

View all