CVE-2024-22233

In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.
References
Link Resource
https://spring.io/security/cve-2024-22233/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vmware:spring_framework:6.0.15:*:*:*:*:*:*:*
cpe:2.3:a:vmware:spring_framework:6.1.2:*:*:*:*:*:*:*

History

29 Jan 2024, 17:24

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References () https://spring.io/security/cve-2024-22233/ - () https://spring.io/security/cve-2024-22233/ - Vendor Advisory
First Time Vmware spring Framework
Vmware
CPE cpe:2.3:a:vmware:spring_framework:6.1.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:spring_framework:6.0.15:*:*:*:*:*:*:*
Summary
  • (es) En las versiones 6.0.15 y 6.1.2 de Spring Framework, es posible que un usuario proporcione solicitudes HTTP especialmente manipuladas que pueden causar una condición de denegación de servicio (DoS). Específicamente, una aplicación es vulnerable cuando se cumple todo lo siguiente: * la aplicación usa Spring MVC * Spring Security 6.1.6+ o 6.2.1+ está en el classpath Normalmente, las aplicaciones Spring Boot necesitan org.springframework.boot:spring-boot-starter-web y org.springframework.boot:spring-boot-starter-security para cumplir con todas las condiciones.

22 Jan 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-22 13:15

Updated : 2024-01-29 17:24


NVD link : CVE-2024-22233

Mitre link : CVE-2024-22233

CVE.ORG link : CVE-2024-22233


JSON object : View

Products Affected

vmware

  • spring_framework