Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-38809

Опубликовано: 24 сент. 2024
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

Applications that parse ETags from "If-Match" or "If-None-Match" request headers are vulnerable to DoS attack. Users of affected versions should upgrade to the corresponding fixed version. Users of older, unsupported versions could enforce a size limit on "If-Match" and "If-None-Match" headers, e.g. through a Filter.

A flaw was found in the Spring Web (org.springframework:spring-web) package. Due to improper ETag prefix validation when the application parses ETags from the If-Match or If-None-Match request headers, an attacker can trigger a denial of service by sending a maliciously crafted conditional HTTP request.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2org.springframework/spring-webWill not fix
Red Hat AMQ Broker 7org.springframework/spring-webFix deferred
Red Hat build of Apache Camel for Spring Boot 3org.springframework/spring-webNot affected
Red Hat build of Apache Camel - HawtIO 4org.springframework/spring-webAffected
Red Hat Build of Keycloakorg.springframework/spring-webNot affected
Red Hat build of OptaPlanner 8org.springframework/spring-webWill not fix
Red Hat Data Grid 8org.springframework/spring-webNot affected
Red Hat Fuse 7org.springframework/spring-webOut of support scope
Red Hat Integration Camel K 1org.springframework/spring-webNot affected
Red Hat JBoss Data Grid 7org.springframework/spring-webNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1333
https://bugzilla.redhat.com/show_bug.cgi?id=2314495org.springframework:spring-web: Spring Framework DoS via conditional HTTP request

EPSS

Процентиль: 34%
0.0014
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 1 года назад

Applications that parse ETags from "If-Match" or "If-None-Match" request headers are vulnerable to DoS attack. Users of affected versions should upgrade to the corresponding fixed version. Users of older, unsupported versions could enforce a size limit on "If-Match" and "If-None-Match" headers, e.g. through a Filter.

CVSS3: 5.3
nvd
больше 1 года назад

Applications that parse ETags from "If-Match" or "If-None-Match" request headers are vulnerable to DoS attack. Users of affected versions should upgrade to the corresponding fixed version. Users of older, unsupported versions could enforce a size limit on "If-Match" and "If-None-Match" headers, e.g. through a Filter.

CVSS3: 5.3
debian
больше 1 года назад

Applications that parse ETags from "If-Match" or "If-None-Match" reque ...

CVSS3: 5.3
github
больше 1 года назад

Spring Framework DoS via conditional HTTP request

CVSS3: 5.3
fstec
больше 1 года назад

Уязвимость программной платформы Spring Framework, связанная с ошибками освобождения ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 34%
0.0014
Низкий

5.3 Medium

CVSS3

Уязвимость CVE-2024-38809