CVE-2023-20873: Security Bypass With Wildcard Pattern Matching on Cloud Foundry

HIGH | APRIL 20, 2023 | CVE-2023-20873

Description

In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, 2.6.0 - 2.6.14, 2.5.0 - 2.5.14 and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass.

Specifically, an application is vulnerable when all of the following are true:

  • You have code that can handle requests that match /cloudfoundryapplication/**. Typically, this will be if there is a catch-all request mapping which matches /**.
  • The application is deployed to Cloud Foundry.

NOTE: Applications using Spring Cloud Config Server can handle requests to /cloudfoundryapplication/** by default and can be vulnerable if deployed to Cloud Foundry.

An application is not vulnerable if any of the following is true:

  • The application is not deployed to Cloud Foundry
  • You have disabled Cloud Foundry actuator endpoints with management.cloudfoundry.enabled set to false.
  • Your application does not have handler mappings that can handle requests to /cloudfoundryapplication/**.

Affected Spring Products and Versions

Spring Boot

  • 3.0.0 to 3.0.5
  • 2.7.0 to 2.7.10
  • 2.6.0 to 2.6.14
  • 2.5.0 to 2.5.14
  • Older, unsupported versions are also affected

Mitigation

Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. 2.6.x users should upgrade to 2.6.15+. 2.5.x users should upgrade to 2.5.15+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+.

Workarounds: Disable Cloud Foundry actuator endpoints by setting management.cloudfoundry.enabled to false.

Get ahead

VMware offers training and certification to turbo-charge your progress.

Learn more

Get support

Tanzu Spring offers support and binaries for OpenJDK™, Spring, and Apache Tomcat® in one simple subscription.

Learn more

Upcoming events

Check out all the upcoming events in the Spring community.

View all