CVE-2026-40973
Lokalny atakujący może przejąć kontrolę nad katalogiem `ApplicationTemp` i wykraść dane sesji.
A local attacker on the same host as the application may be able to take control of the directory used by `ApplicationTemp`. When `server.servlet.session.persistent` is set to `true` and the attack persists across application restarts, this may allow the attacker to read session information and hijack authenticated users or deploy a gadget chain and execute code as the application's user. Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); predictable temp directory / `ApplicationTemp` ownership verification. Versions that are no longer supported are also affected per vendor advisory.
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.0 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-04-28 00:16:24 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-30 14:25:36 UTC |
- https://spring.io/security/cve-2026-40973 (security@vmware.com) [Vendor Advisory]