Sensitive Information Exposure in Spring Vault by VMware
CVE-2023-20859

5.5MEDIUM

Key Information:

Vendor
Vmware
Vendor
CVE Published:
23 March 2023

Summary

In versions of Spring Vault prior to 3.0.2 and 2.3.3, a vulnerability exists that allows sensitive information to be written to log files. This occurs when the application is trying to revoke a Vault batch token. Such exposure can potentially be exploited to access confidential data, posing a risk to application security. It is crucial for users of affected versions to implement the necessary updates to mitigate this vulnerability.

Affected Version(s)

Spring Vault, Spring Cloud Vault, Spring Cloud Config Spring Vault (3.0.0 to 3.0.1, 2.3.0 to 2.3.2), Spring Cloud Vault (4.0.0, 3.1.0 to 3.1.2 and older versions), Spring Cloud Config (4.0.0 to 4.0.1, 3.1.0 to 3.1.6 and older versions)

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.