Get ahead
VMware offers training and certification to turbo-charge your progress.
Learn moreIn Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking.
Specifically, an application is vulnerable when the following is true:
An application is not vulnerable if any of the following is true:
Spring Session 3.0.0
Users of affected versions should upgrade to Spring Session 3.0.1. Releases that have fixed this issue include:
This issue was identified and responsibly reported by Benedikt Halser from DATEV eG
The VMware Security Response team provides a single point of contact for the reporting of security vulnerabilities in VMware Tanzu products and coordinates the process of investigating any reported vulnerabilities.
To report a security vulnerability in a VMware service or product please refer to the VMware Security Response Policy.