Spring Framework URL Parsing with Host Validation Vulnerability
High severity
GitHub Reviewed
Published
Mar 16, 2024
to the GitHub Advisory Database
•
Updated Jun 10, 2024
Package
Affected versions
>= 6.1.0, < 6.1.5
>= 6.0.0, < 6.0.18
< 5.3.33
Patched versions
6.1.5
6.0.18
5.3.33
Description
Published by the National Vulnerability Database
Mar 16, 2024
Published to the GitHub Advisory Database
Mar 16, 2024
Reviewed
Mar 18, 2024
Last updated
Jun 10, 2024
Applications that use UriComponentsBuilder in Spring Framework to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.
This is the same as CVE-2024-22243 https://spring.io/security/cve-2024-22243, but with different input.
References