Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-22243

Опубликовано: 21 фев. 2024
Источник: redhat
CVSS3: 3.4
EPSS Средний

Описание

Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks.

A vulnerability was discovered in Spring Framework. Under certain conditions, an attacker might be able to trigger an open redirect. This issue can simplify the process of conducting a phishing attack against users of the deployment.

Отчет

The open redirect vulnerability discovered in the Spring Framework poses a moderate severity issue due to its potential to facilitate phishing attacks. While it doesn't directly lead to data compromise or system takeover, it significantly increases the likelihood of users being misled into visiting malicious websites.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of Apache Camel for Spring Boot 3springframeworkOut of support scope
Red Hat Data Grid 8springframeworkNot affected
Red Hat JBoss Data Grid 7springframeworkNot affected
streams for Apache KafkaspringframeworkWill not fix
Red Hat Fuse 7.13.0springframeworkFixedRHSA-2024:335423.05.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-601
https://bugzilla.redhat.com/show_bug.cgi?id=2265735springframework: URL Parsing with Host Validation

EPSS

Процентиль: 98%
0.558
Средний

3.4 Low

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 2 года назад

Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks.

CVSS3: 8.1
nvd
почти 2 года назад

Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks.

CVSS3: 8.1
debian
почти 2 года назад

Applications that use UriComponentsBuilderto parse an externally provi ...

CVSS3: 8.1
github
почти 2 года назад

Spring Web vulnerable to Open Redirect or Server Side Request Forgery

CVSS3: 8.1
fstec
почти 2 года назад

Уязвимость программной платформы Spring Framework, существующая из-за недостаточной валидации вводимых пользователем данных, позволяющая нарушителю осуществить SSRF-атаку

EPSS

Процентиль: 98%
0.558
Средний

3.4 Low

CVSS3