Bug 2187742 (CVE-2023-20863)
Summary: | CVE-2023-20863 springframework: Spring Expression DoS Vulnerability | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Chess Hazlett <chazlett> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aileenc, chazlett, gmalinko, janstey, jpavlik, jpoth, pdelbell, peholase, pjindal, tcunning, yfang |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | spring framework 6.0.8, spring framework 5.3.27, spring framework 5.2.24.RELEASE | Doc Type: | --- |
Doc Text: |
A flaw was found in Spring Framework. Certain versions of Spring Framework's Expression Language were not restricting the size of Spring Expressions. This could allow an attacker to craft a malicious Spring Expression to cause a denial of service on the server.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-05-03 20:35:33 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 2186653 |
Description
Chess Hazlett
2023-04-18 15:07:00 UTC
This issue has been addressed in the following products: RHINT Camel-Springboot 3.18.3.P1 Via RHSA-2023:2099 https://access.redhat.com/errata/RHSA-2023:2099 This issue has been addressed in the following products: RHINT Camel-Springboot 3.20.1 Via RHSA-2023:2100 https://access.redhat.com/errata/RHSA-2023:2100 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-20863 |