Lucene search

K
vulnrichmentVmwareVULNRICHMENT:CVE-2024-22262
HistoryApr 16, 2024 - 5:54 a.m.

CVE-2024-22262 CVE-2024-22262: Spring Framework URL Parsing with Host Validation

2024-04-1605:54:12
vmware
github.com
1
cve-2024-22262
spring framework
url parsing
host validation
open redirect
ssrf
vulnerability

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

6.6 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.2%

Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks.

This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259  and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.

CNA Affected

[
  {
    "vendor": "Spring",
    "product": "Spring Framework",
    "versions": [
      {
        "status": "affected",
        "version": "6.1.x",
        "lessThan": "6.1.6",
        "versionType": "6.1.6"
      },
      {
        "status": "affected",
        "version": "6.0.x",
        "lessThan": "6.0.19",
        "versionType": "6.0.19"
      },
      {
        "status": "affected",
        "version": "5.3.x",
        "lessThan": "5.3.34",
        "versionType": "5.3.34"
      }
    ],
    "defaultStatus": "affected"
  }
]

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

6.6 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.2%