CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
22.8%
In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver.
Vendor | Product | Version | CPE |
---|---|---|---|
vmware | spring_session | 3.0.0 | cpe:2.3:a:vmware:spring_session:3.0.0:*:*:*:*:*:*:* |
[
{
"vendor": "n/a",
"product": "Spring Session",
"versions": [
{
"version": "Spring session versions 3.0.x prior to 3.0.1",
"status": "affected"
}
]
}
]