CVE-2023-20859
MEDIUMVmware Spring Cloud Config < 3.1.6 - Log Information Exposure
Title source: ruleDescription
In Spring Vault, versions 3.0.x prior to 3.0.2 and versions 2.3.x prior to 2.3.3 and older versions, an application is vulnerable to insertion of sensitive information into a log file when it attempts to revoke a Vault batch token.
References (1)
Core 1
Core References
Vendor Advisory
https://spring.io/security/cve-2023-20859
Scores
CVSS v3
5.5
EPSS
0.0011
EPSS Percentile
28.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-532
Status
published
Products (5)
org.springframework.vault/spring-vault-core
3.0.0 - 3.0.2Maven
vmware/spring_cloud_config
3.1.0 - 3.1.6
vmware/spring_cloud_vault
4.0.0
vmware/spring_cloud_vault
3.1.0 - 3.1.2
vmware/spring_vault
2.3.0 - 2.3.3
Published
Mar 23, 2023
Tracked Since
Feb 18, 2026