A batch loader function in Spring for GraphQL versions 1.1.0 - 1.1.5 and 1.2.0 - 1.2.2 may be exposed to GraphQL context with values, including security context values, from a different session. An application is vulnerable if it provides a DataLoaderOptionsĀ instance when registering batch loader functions through DefaultBatchLoaderRegistry.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://spring.io/security/cve-2023-34047 |
![]() ![]() |
History
Tue, 24 Sep 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2024-09-24T19:04:05.232Z
Reserved: 2023-05-25T17:21:56.202Z
Link: CVE-2023-34047

Updated: 2024-08-02T16:01:53.784Z

Status : Modified
Published: 2023-09-20T10:15:14.247
Modified: 2024-11-21T08:06:28.197
Link: CVE-2023-34047

No data.