Spring Security Advisories

CVE-2023-20863: Spring Expression DoS Vulnerability

HIGH | APRIL 13, 2023 | CVE-2023-20863

Description

In Spring Framework versions 6.0.0 - 6.0.7, 5.3.0 - 5.3.26, 5.2.0.RELEASE - 5.2.23.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.

Affected Spring Products and Versions

  • Spring Framework
    • 6.0.0 to 6.0.7
    • 5.3.0 to 5.3.26
    • 5.2.0.RELEASE to 5.2.23.RELEASE
    • Older, unsupported versions are also affected

Mitigation

Users of affected versions should apply the following mitigation: 6.0.x users should upgrade to 6.0.8+. 5.3.x users should upgrade to 5.3.27+. 5.2.x users should upgrade to 5.2.24.RELEASE+. Users of older, unsupported versions should upgrade to 6.0.8+ or 5.3.27+. No other steps are necessary. Releases that have fixed this issue include:

  • Spring Framework
    • 6.0.8+
    • 5.3.27+
    • 5.2.24.RELEASE+

Credit

This vulnerability was initially discovered and responsibly reported by the Google OSS-Fuzz team from Code Intelligence.

History

  • 2023-04-13: Initial vulnerability report published.

Get ahead

VMware offers training and certification to turbo-charge your progress.

Learn more

Get support

Tanzu Spring Runtime offers support and binaries for OpenJDK™, Spring, and Apache Tomcat® in one simple subscription.

Learn more

Upcoming events

Check out all the upcoming events in the Spring community.

View all