Spring Framework URL Parsing with Host Validation
High severity
GitHub Reviewed
Published
Apr 16, 2024
to the GitHub Advisory Database
•
Updated Aug 27, 2024
Package
Affected versions
< 5.3.34
>= 6.0.0, < 6.0.19
>= 6.1.0, < 6.1.6
Patched versions
5.3.34
6.0.19
6.1.6
Description
Published by the National Vulnerability Database
Apr 16, 2024
Published to the GitHub Advisory Database
Apr 16, 2024
Reviewed
Apr 16, 2024
Last updated
Aug 27, 2024
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.
This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259 and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.
References