Session Management Flaw in Spring Security Affects User Authentication
CVE-2023-20862
6.3MEDIUM
Summary
In Spring Security, certain versions exhibit a flaw in the logout process that fails to effectively clear the security context when utilizing serialized versions. This issue can result in users remaining authenticated even after they attempt to log out. Specifically, it prevents the explicit saving of an empty security context, potentially allowing unauthorized access. Users are advised to upgrade to the appropriate patched versions—5.7.8 for 5.7.x, 5.8.3 for 5.8.x, and 6.0.3 for 6.0.x—to mitigate this vulnerability.
Affected Version(s)
Spring Security Spring Security, versions 5.7.x prior to 5.7.8, versions 5.8.x prior to 5.8.3, and versions 6.0.x prior to 6.0.3
References
CVSS V3.1
Score:
6.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved