Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-22262

Опубликовано: 16 апр. 2024
Источник: redhat
CVSS3: 8.1

Описание

Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks. This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259  and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.

A flaw was found in the Spring Framework. Applications that use UriComponentsBuilder to parse an externally provided URL, for example, through a query parameter, and perform validation checks on the host of the parsed URL may be vulnerable to an open redirect attack or an SSRF attack if the URL is used after passing validation checks.

Отчет

Red Hat Fuse 7 does not use the affected function, but the function is still available for user convenience which demands one to validate the input.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2springframeworkNot affected
Red Hat AMQ Broker 7springframeworkNot affected
Red Hat build of Apache Camel for Spring Boot 3springframeworkAffected
Red Hat build of Apache Camel for Spring Boot 4springframeworkNot affected
Red Hat build of Apache Camel - HawtIO 4springframeworkAffected
Red Hat Build of KeycloakspringframeworkNot affected
Red Hat build of OptaPlanner 8springframeworkNot affected
Red Hat Fuse 7springframeworkAffected
Red Hat Integration Camel K 1springframeworkNot affected
Red Hat Process Automation 7springframeworkNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-601
https://bugzilla.redhat.com/show_bug.cgi?id=2275257springframework: URL Parsing with Host Validation

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 2 года назад

Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks. This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259  and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.

CVSS3: 8.1
nvd
почти 2 года назад

Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks. This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259  and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.

CVSS3: 8.1
debian
почти 2 года назад

Applications that use UriComponentsBuilderto parse an externally provi ...

CVSS3: 8.1
github
почти 2 года назад

Spring Framework URL Parsing with Host Validation

CVSS3: 8.1
fstec
почти 2 года назад

Уязвимость компонента анализа URL-адресов UriComponentsBuilder программной платформы Spring Framework, позволяющая нарушителю осуществить SSRF-атаку

8.1 High

CVSS3