Hello team,

This might have been already be reported, and if it is, apologies, feel free to close, take this as me just wishing you a good day.

It seems there is a CVE on logback 1.4.11 from

[INFO] +- org.springframework.boot:spring-boot-starter-webflux:jar:3.2.0:compile
[INFO] |  +- org.springframework.boot:spring-boot-starter:jar:3.2.0:compile
[INFO] |  |  +- org.springframework.boot:spring-boot:jar:3.2.0:compile
[INFO] |  |  |  \- org.springframework:spring-context:jar:6.1.1:compile
[INFO] |  |  |     +- org.springframework:spring-aop:jar:6.1.1:compile
[INFO] |  |  |     \- org.springframework:spring-expression:jar:6.1.1:compile
[INFO] |  |  +- org.springframework.boot:spring-boot-starter-logging:jar:3.2.0:compile
[INFO] |  |  |  +- ch.qos.logback:logback-classic:jar:1.4.11:compile
[INFO] |  |  |  |  \- ch.qos.logback:logback-core:jar:1.4.11:compile

Would be great if it can get bumped.

Thank you

Comment From: wilkinsona

We'll upgrade in due course. In the meantime, you can override the dependency version to meet your needs. It is also worth noting the conditions that are required in order to be exploitable:

This is only exploitable if logback receiver component is deployed

This is not the case by default in Spring Boot.

Comment From: patpatpat123

Thank you

Comment From: schaoukicoveo

We'll upgrade in due course. In the meantime, you can override the dependency version to meet your needs. It is also worth noting the conditions that are required in order to be exploitable:

This is only exploitable if logback receiver component is deployed

This is not the case by default in Spring Boot. @wilkinsona Sorry pretty knew in the spring boot environment but i wanted to know how can one check if logback receiver component is enabled

Comment From: wilkinsona

Check your logback.xml or logback-spring.xml configuration.

Comment From: schaoukicoveo

Thank you mate

Comment From: dogilvie

We'll upgrade in due course. In the meantime, you can override the dependency version to meet your needs. It is also worth noting the conditions that are required in order to be exploitable:

This is only exploitable if logback receiver component is deployed

This is not the case by default in Spring Boot.

Hi Andy, why does spring not just bump to the latest patch release (currently 1.4.14) in this case?

Attempted, but unit test failures?

I'm interested in the mindset behind the delay.

Comment From: bclozel

@dogilvie there is no delay. We usually run our dependency upgrade process a few days before the release to not miss any. Our next set of maintenance releases is scheduled on December 21, see https://github.com/spring-projects/spring-boot/milestones

Comment From: GeneralNitin

Hi, Can someone please share an example of how to exclude and include, because it is not working for me. :( Thanks, Nitin

Comment From: bclozel

@GeneralNitin you don't need to include/exclude dependencies but you can just override the version if you are using the Spring Boot build plugins. See Maven and Gradle docs for overriding managed versions.

Comment From: geniot

Hi, Can someone please share an example of how to exclude and include, because it is not working for me. :( Thanks, Nitin

I added 1.5.15 to my project's properties and Intellij stopped showing the spring-boot-starter-web dependency as vulnerable.