Information Exposure Affecting org.springframework.graphql:spring-graphql package, versions [1.1.0,1.1.6)[1.2.0,1.2.3)


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.48% (64th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGSPRINGFRAMEWORKGRAPHQL-5907720
  • published20 Sept 2023
  • disclosed19 Sept 2023
  • creditJack Rowland

Introduced: 19 Sep 2023

CVE-2023-34047  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade org.springframework.graphql:spring-graphql to version 1.1.6, 1.2.3 or higher.

Overview

org.springframework.graphql:spring-graphql is a GraphQL Support for Spring Applications

Affected versions of this package are vulnerable to Information Exposure via the DefaultBatchLoaderRegistry function. If an application provides a DataLoaderOptions instance when registering batch loader functions through the vulnerable function, it may get exposed to GraphQL context with values, including security context values, from a different session.

CVSS Base Scores

version 3.1