Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-22233

Опубликовано: 22 янв. 2024
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true:

  • the application uses Spring MVC
  • Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.

    A flaw was found in the Spring Framework. This issue may allow a remote user to provide specially crafted HTTP requests, leading the application to a Denial of Service (DoS). An application may be considered vulnerable if it meets the both conditions: The application uses Spring MVC and Spring Security versions 6.1.6, 6.2.1, or above are set on the classpath.

Отчет

After careful consideration, Redhat has rated this vulnerability as moderate severity as successful exploitation of this flaw depends on various factors such as org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies, the application uses Spring MVC,Spring Security 6.1.6+ or 6.2.1+ is on the classpath.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2spring-bootNot affected
Migration Toolkit for Runtimesspring-bootNot affected
Red Hat AMQ Broker 7spring-bootNot affected
Red Hat build of Apache Camel for Spring Boot 3spring-bootNot affected
Red Hat build of OptaPlanner 8spring-bootNot affected
Red Hat Data Grid 8spring-bootNot affected
Red Hat Decision Manager 7spring-bootOut of support scope
Red Hat Enterprise Linux 8log4j:2/log4jNot affected
Red Hat Enterprise Linux 9log4jNot affected
Red Hat Fuse 7spring-bootNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2259703spring-boot: Crafted HTTP requests may lead to debial-of-service (DOS)

EPSS

Процентиль: 75%
0.00925
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.

CVSS3: 7.5
nvd
больше 1 года назад

In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.

CVSS3: 7.5
debian
больше 1 года назад

In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a us ...

CVSS3: 7.5
github
больше 1 года назад

Spring Framework server Web DoS Vulnerability

CVSS3: 7.5
fstec
больше 1 года назад

Уязвимость шаблона проектирования Spring MVC программной платформы Spring Framework, Java-фреймворка для обеспечения безопасности промышленных приложений Spring Security и фреймворка для создания веб-приложений Spring Boot, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 75%
0.00925
Низкий

7.5 High

CVSS3

Уязвимость CVE-2024-22233