In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-1303 In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+.
Github GHSA Github GHSA GHSA-g5h3-w546-pj7f Spring Boot Security Bypass with Wildcard Pattern Matching on Cloud Foundry
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 05 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2025-05-05T16:06:07.713Z

Reserved: 2022-11-01T00:00:00.000Z

Link: CVE-2023-20873

cve-icon Vulnrichment

Updated: 2024-08-02T09:21:33.339Z

cve-icon NVD

Status : Modified

Published: 2023-04-20T21:15:08.717

Modified: 2025-05-05T16:15:29.343

Link: CVE-2023-20873

cve-icon Redhat

Severity : Important

Publid Date: 2023-05-18T00:00:00Z

Links: CVE-2023-20873 - Bugzilla

cve-icon OpenCVE Enrichment

No data.