Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1303 | In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+. |
Github GHSA |
GHSA-g5h3-w546-pj7f | Spring Boot Security Bypass with Wildcard Pattern Matching on Cloud Foundry |
Mon, 05 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2025-05-05T16:06:07.713Z
Reserved: 2022-11-01T00:00:00.000Z
Link: CVE-2023-20873
Updated: 2024-08-02T09:21:33.339Z
Status : Modified
Published: 2023-04-20T21:15:08.717
Modified: 2025-05-05T16:15:29.343
Link: CVE-2023-20873
OpenCVE Enrichment
No data.
EUVD
Github GHSA