Bug 2259703 (CVE-2024-22233) - CVE-2024-22233 spring-boot: Crafted HTTP requests may lead to debial-of-service (DOS)
Summary: CVE-2024-22233 spring-boot: Crafted HTTP requests may lead to debial-of-servi...
Keywords:
Status: NEW
Alias: CVE-2024-22233
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2259706
Blocks: 2259704
TreeView+ depends on / blocked
 
Reported: 2024-01-22 20:58 UTC by Marco Benatto
Modified: 2024-04-30 23:00 UTC (History)
64 users (show)

Fixed In Version:
Doc Type: ---
Doc Text:
A flaw was found in the Spring Framework. This issue may allow a remote user to provide specially crafted HTTP requests, leading the application to a Denial of Service (DoS). An application may be considered vulnerable if it meets the both conditions: The application uses Spring MVC and Spring Security versions 6.1.6, 6.2.1, or above are set on the classpath.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Marco Benatto 2024-01-22 20:58:56 UTC
In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition.

Specifically, an application is vulnerable when all of the following are true:

  *  the application uses Spring MVC
  *  Spring Security 6.1.6+ or 6.2.1+ is on the classpath


Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.

Comment 1 Patrick Del Bello 2024-01-22 21:07:43 UTC
Created log4j tracking bugs for this issue:

Affects: fedora-all [bug 2259706]

Comment 4 Vipul Nair 2024-01-30 13:21:04 UTC
Those versions are respectively being used by Spring Boot 3.1.7 and 3.2.1. are the ones that are affected.


Note You need to log in before you can comment on or make changes to this bug.