Описание
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.
This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259 and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.
A flaw was found in the Spring Framework. Applications that use UriComponentsBuilder to parse an externally provided URL, for example, through a query parameter, and perform validation checks on the host of the parsed URL may be vulnerable to an open redirect attack or an SSRF attack if the URL is used after passing validation checks.
Отчет
Red Hat Fuse 7 does not use the affected function, but the function is still available for user convenience which demands one to validate the input.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| A-MQ Clients 2 | springframework | Not affected | ||
| Red Hat AMQ Broker 7 | springframework | Not affected | ||
| Red Hat build of Apache Camel for Spring Boot 3 | springframework | Affected | ||
| Red Hat build of Apache Camel for Spring Boot 4 | springframework | Not affected | ||
| Red Hat build of Apache Camel - HawtIO 4 | springframework | Affected | ||
| Red Hat Build of Keycloak | springframework | Not affected | ||
| Red Hat build of OptaPlanner 8 | springframework | Not affected | ||
| Red Hat Fuse 7 | springframework | Affected | ||
| Red Hat Integration Camel K 1 | springframework | Not affected | ||
| Red Hat Process Automation 7 | springframework | Not affected |
Показывать по
Дополнительная информация
Статус:
8.1 High
CVSS3
Связанные уязвимости
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks. This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259 and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks. This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259 and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.
Applications that use UriComponentsBuilderto parse an externally provi ...
Spring Framework URL Parsing with Host Validation
Уязвимость компонента анализа URL-адресов UriComponentsBuilder программной платформы Spring Framework, позволяющая нарушителю осуществить SSRF-атаку
8.1 High
CVSS3