Low severityNVD Advisory· Published Sep 20, 2023· Updated Sep 24, 2024
Exposure of data and identity to wrong session in Spring for GraphQL
CVE-2023-34047
Description
A batch loader function in Spring for GraphQL versions 1.1.0 - 1.1.5 and 1.2.0 - 1.2.2 may be exposed to GraphQL context with values, including security context values, from a different session. An application is vulnerable if it provides a DataLoaderOptions instance when registering batch loader functions through DefaultBatchLoaderRegistry.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.springframework.graphql:spring-graphqlMaven | >= 1.1.0, < 1.1.6 | 1.1.6 |
org.springframework.graphql:spring-graphqlMaven | >= 1.2.0, < 1.2.3 | 1.2.3 |
Affected products
1- Range: 1.1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-frqc-f2h8-fjvfghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-34047ghsaADVISORY
- spring.io/security/cve-2023-34047ghsaWEB
News mentions
0No linked articles in our index yet.